SPEAK WITH AN EXPERT

What’s Hot at Infosecurity Europe

Infosec Europe is coming up after a two-year COVID break! Running June 21–23 at ExCeL, London, Infosec is a wonderful opportunity to see how the industry has progressed and learn about emerging threats and trends. CyberProof will be there, of course – make sure to visit us at Stand T25. You can register for a demo or meeting with our team here.

Meet us at Infosecurity Europe

We’ve taken a good look at the conference program, and there are some fabulous sessions. If you’re attending Infosec, here are a few that you won’t want to miss.

Future-Proofing Your SOC: Optimizing Your SOC for the Cloud to Mitigate the Risks of Cyber Attack

The cloud offers many benefits, from greater ease of deployment to faster time to value, but it also creates new cybersecurity risks. As more organizations move their infrastructure and IT services to the cloud, it’s common to adopt services from more than one provider – such as Amazon AWS and Microsoft Azure. This provides more flexibility than working with only one cloud platform, allows organizations to better manage costs and avoid vendor lock in, and improves resiliency. However, this opens up new attack surfaces and cyber risks requiring security operations teams to monitor quickly – and adapt their practices to detect and respond to security threats in their cloud environments. Advanced MDR providers like CyberProof leverage the power of frameworks such as MITRE ATT&CK in their threat detection and response strategy, allowing enterprises to monitor the cloud effectively and mitigate the risk of attack.

The Technology Showcase session “Future-Proofing Your SOC: Optimizing Your SOC for the Cloud to Mitigate the Risks of Cyber Attack” will explore some of these issues. The session will be given by Jaimon Thomas, Global Head, Security Solutions at CyberProof.

How Hacking Really Works

The fast-changing threat landscape and ever-growing number and complexity of cyber attacks makes it a challenge for security operations teams to protect large-scale organizations. What’s key is to optimize the development of use case content and prioritize where resources are invested – ensuring new security content is continuously geared toward meeting the most likely threats to the business. At CyberProof, for example, our proprietary Use Case Factory provides direction for security teams in prioritizing the development of security content.

The Keynote Stage session “How Hacking Really Works” explores the latest threats and how attackers are changing their approaches, with hands-on demonstration of hacking and malware attacks to sharpen your understanding of security risks. The session will be given by James Lyne, CTO at SANS & Founder at Secure Impact.

{{cta(‘2bddf5e0-c17d-4f46-9a56-eff087074034’)}}

Mastering Your Incident Response Plan to Minimize Financial & Reputational Damages

Developing an effective incident response plan is key to measurably reducing risk and minimizing the business impact of a potential attack. At the same time, it is a challenging to maintain incident response plans that stay ahead of the changing threat landscape.

The Keynote Stage session “Mastering Your Incident Response Plan to Minimize Financial and Reputational Damages” explores how to orchestrate the recovery process to swiftly restore data and ensure that critical applications are brought back swiftly. The session will be led by Lewis Woodcock, Director, Cyber Operations at Maersk.

Back to the Basics of Government, Risk & Compliance – Framework & Cyber Hygiene Best Practices

Many enterprises are managing the complexities of real-time monitoring in a multi-cloud environment. In addition to multiple clouds, frequently the data for each cloud is stored in multiple locations to align with regulatory requirements – and the data for each resource needs to be monitored while it continues to reside in its respective environment.

The Keynote Stage session “Back to the Basics of GRC – Framework & Cyber Hygiene Best Practices” touches on issues related to security governance and compliance globally. The session will be led by Vincent Blake, VP, Digital Technology Security Officer & GRCA at Pearson.

{{cta(‘2bddf5e0-c17d-4f46-9a56-eff087074034’)}}

A Risk Based Approach to Business Continuity in the Industrial Control Space

New challenges in the cybersecurity field are related to OT and IT convergence, which lead to the possibility of attacks on physical infrastructures. Because everything has become so connected, we are going to be facing completely new vulnerabilities and different attack scenarios, such as managing the risk of attacks on self-driving vehicles and other new connected devices. There is real cause for concern, because these are types of attacks that can directly affect people in their everyday lives. Here, too, developing cyber resilience is key to reducing the risks.

The Keynote Stage session “A Risk Based Approach to Business Continuity in the Industrial Control Space” touches on the specific cybersecurity challenges related to OT systems. The session will be led by Craig McEwen, CISO of Anglo American.

Interested in learning more about how CyberProof’s solutions can help you mitigate cyber risk? Visit us at Stand T25 at Infosecurity Europe!