Security: Now and the FutureEVENT
Success Stories for Security Operations, Security Analytics, Security Automation, Identity Governance
At Bright Security practice we see organizations handling complex security threats with limited resources, multiple security tools and manual disconnected processes. This silo approach to information security is not enough in the ever-changing cybersecurity landscape.
At this event our goal is to give you our vision of the Now and Future hot topics in Information Security and how to address them. We will share our experience working with companies from different countries and industries. We will show you some real-life examples of breaking the boundaries between Security & IT through analytics, processes, automation and everything involved in making your organization secure.
Most of all, our goal is to give you a forum to meet like-minded professionals, talk about current challenges and learn how to handle what the future brings.
09:00 – 09:30 : Registration & Welcome Coffee
09:30 – 09:45 : Keynote session – Angel Kanchev, General Manager, Bright Consulting
09:45 – 10:15 : Vulnerability and Compliance Management Reinvented through Automation
An innovative approach to handle increasing complexity of security incidents and new compliance regulations in a multi-faceted IT environment. Best practices to enable collaboration between Security and IT, prioritize and respond to vulnerabilities based on business impact, speed up remediation through automation. Case studies & lessons learnt.
10:15 – 10:45 : Analytics-driven approach to Security: Next Generation SIEM
What is analytics-driven concept? Why it is needed today and why it is the future.
How to implement. Case studies & lessons learnt.
10:45 – 11:15 : Coffee Break
11:15 – 11:45 : Data platforms for Anti-Fraud: The nerve center
How machine data can be used in real time to control Fraud?
How to implement analytics-driven approach to manage Fraud in real-time and manage Risk?
Case studies and live demo for Fraud management solutions.
11:45 – 12:15 : How to select the right SOC model for your organization
The journey in building the right Security Operations. From manual processes to security automation and orchestration and user behavior analytics. A new approach to security incident response.
12:15 – 12:45 : Is the Identity Management in your organization really managing digital identities?
How to manage digital identities that get access to sensitive data whether it resides in systems, cloud apps, or in files and folders? Best practices to enable Security, HR and IT tes to collaborate in ensuring identity governance and access management by answering key questions: Who has access to what? Who should have access? How is that access being used?
12:45 – 13:00 : Q&A
13:00 – 14:00 : Networking Lunch