IT Workshop Week
Tuesday, June 15
Every organisation gets compromised - it’s how fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.
With Mitre ATT&CK the de facto standard in understanding adversarial Tactics & Techniques, and Breach & Attack Simulation forecast as a top 10 2021 trend, it's time to see how to operationalise them together. In this session we will discuss & live demo some Mitre ATT&CK use cases using Navigator, and how ThreatSim can help achieve that aim by identifying gaps and misconfigurations and remediating them.
Andy also intends using the 25 min “interactive” part as a practical demo of a Mitre ATT&CK use-case, and how a customer might use ThreatSIm to achieve that use-case. In this session, it gives the opportunity to make it interactive by asking how they use Mitre ATT&CK, how they test data sources etc. it will involve me using ATTACK navigator, then switching to ThreatSim. We can make that 15 mins, and have 10 mins Q&A.
Wednesday, June 16
Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Securing evolving IT architectures is becoming one more challenge that short-staffed security teams are facing today. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.
Attending this event you will understand how to:
• Unleash the full power of your security stack
• Improve incident response times through extensive integrations
• Extend protection to support your digital transformations
To enable employees to continue to work during COVID, business and IT went through a huge amount of change in a very short period of time. In a lot of cases IT security had to be ignored in order to enable this rapid change.
With the end of the pandemic in sight, organisations now need to take a holistic view of where their employees are working from and the data they are accessing. Many businesses are already paying for the tools that can help them secure their confidential business data and protect them from cyber threats. Those businesses that don't put security at the forefront of their IT strategy leave themselves exposed to potential financial and reputational risk.
In this workshop, we will examine the main IT threats that can potentially impact a business and how the Microsoft security stack can help mitigate these risks.
• How businesses had to change during the pandemic
• The risks to businesses due to accelerated rate of change
• The changing landscape of IT security
• How Microsoft services can help to reduce business security risk
Thursday, June 17
Organisations today face growing volumes of data across different data stores, resulting in complex data security and sovereignty issues. Thales’s CipherTrust Manager allows organisations to securely migrate to the cloud and provide a single platform for key life cycle management. Encryption of data at rest has also shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.
Join this Workshop to discover –
• The approaches for taking responsibility and control of the data
• How to gain complete visibility and control of you sensitive data
• How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
• The added benefits of a unified data security platform to reduce cost and minimise risk
During the webinar, we will show how, thanks to Power BI, the C-level, management and employees can make more informed business decisions - reduce costs, detect ineffective processes and finally identify new opportunities. You will see the advantage of companies with an already implemented Power BI platform.