Security Digital Summit: Improved security for business resilience

February 28-March 2, 2023 | USA

Security Digital Summit: Improved security for business resilience
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.


OTHER PAST CONFERENCES

Concorde Tech and Cyber Summit 2023

March 22, 2023 | UK

UK businesses face an ever-increasing threat with four in ten businesses having cyber security breaches or attacks in the last 12 months. What are you doing to ensure your business is secure? Concorde Technology Group is hosting an exclusive tech and cybersecurity event at Huddersfield Town Football Club where we will explore the latest tech trends and evolving cyber threat landscape, how this is impacting businesses in the UK, and steps you can implement to protect your business from cybercrime. We will be joined by Jamie Bartlett, presenter and author of the 'The Dark Net' and 'The Missing Crypto Queen', and cyber security experts and vendors who will educate you on all things cyber crime and technology trends.

IDC Security Roadshow

May 16, 2023 | UAE

Among the host of C-suite titles, the CISO is perhaps the most unique. CISOs are at the frontlines of maintaining security in a rapidly evolving threat landscape punctuated with relentless threat actors. In the UAE, CISOs in both the private and public sectors face incredible challenges. Their organizations demand best-in-class security as well as the agility and speed needed to make the right decisions and balance enterprise-related risks and benefits.

Seventh Annual Seattle/Bellevue Cyber Security Summit

March 8, 2023 | USA

The Seventh Annual Seattle/Bellevue Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.

Cyber Security for Financial Services Asia 2023

February 21-24, 2023 | Singapore

Asia’s rapid technology evolution is transforming the threat landscape for the region’s financial institutions. Digitised services and operations have enabled growth and innovation for the industry, but also exacerbated cyber risks and cybercrime. More than 65% of Singapore-based organisations were hit by ransomware last year. At the same time, security attacks have evolved and become more complex with a rise in technically advanced scams and non-technology focused attacks that exploit human vulnerabilities.

Spotlight

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

resources