Implementing 'zero trust' and the adoption of SASE does not have to be exclusive of each other. Enterprises can fully integrate their solutions with the SASE model to help simplify security for remote access. It is essential to understand how SASE converges network capabilities and security functions by uniting 'zero...
In today's unprecedented work-from-home environment, IT organizations are challenged with supporting corporate and BYOD devices.
The security teams have a considerable task of simplifying device enrollment and set up, deploying business and security applications, providing remote support, enforcing patching of...
It's been one of the byproducts of 2020's accelerated digital transformation: IT teams are migrating greater numbers of critical applications to the public cloud to gain the obvious business benefits of scalability, availability and agility.
But what's not always so obvious: The cloud security strategies and tools...
NIST fellow Ron Ross has long been affiliated with risk management and frameworks in support of federal government mandates. Now he's shifting his focus to the future - specifically to what he describes as "the game-changing benefits of DevSecOps." In this session, Ross discusses:
DevOps vulnerabilities
The role...
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
Randy Trzeciak, director of the CERT Insider Threat Center at...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
It's a given that current economic conditions will result in - at best - "conservative" cybersecurity budgets in 2021. And yet it's also fact that cybersecurity is one of the most important business/government functions, and security leaders are in unique positions to influence policy and spending. How can they best...
The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:
How NIST approached remote deployment
Lessons...
The Department of Homeland Security and FBI have their eyes and hands on election cybersecurity, but who's paying attention to securing the actual campaigns? This is the purview of the newly-chartered U.S. CyberDome. In this exclusive session, U.S. CyberDome Executive Director, Brigadier Gen. Francis X. Taylor (Ret.),...
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as...
Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks. Securing a remote workforce has never been more essential for today's organizations. Workers...
This brief will cover the latest trends and developments of financially motivated ransomware attacks. We will discuss the latest intelligence observations pertaining to how threat actors deploy ransomware against various industry targets, as well as the latest developments in how the sophistication of ransomware...
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers.
Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where...
Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
Digital technologies have revolutionized how operators and users interact with the U.S. payments system as new products emerge, back-end operations change and user experiences are enhanced. However, alongside these innovations come unforeseen payments security threats. As the dark web fills with stolen personal...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.