Come join us at our upcoming 4 hour symposium (4 CPE credits)
When: Thursday, April 12 8:30 am – 1:30 pm (Lunch will be provided)
Location: Nike Victory (EDO), 15475 SW Koll Parkway, Beaverton OR 97006
Register by clicking on the date on the calendar widget.
Session 1 (9:00-9:45): Harden Your Unstructured Data at Scale via Classification, Redaction, Encryption, and Reporting
Abstract: Estimates state that 80% of all data is unstructured. It lives in documents, spreadsheets, images, and other types of files. Inappropriate access to those files can lead to a loss of intellectual property, system crashes, and even lost application functionality. Unfortunately, we have to understand the files themselves before we can properly secure them. This is particularly challenging at the scale and speed of modern business. Thankfully, solutions exist to help with this. Come learn how to:
- Discover what data is living in your files
- Easily determine file ownership and entitlements
- Restrict access to critical files
- Redact, and even encrypt, sensitive content
About the Speaker: Leo Duncan is the Analytics Practice Lead at Nordisk Systems. Leo Duncan specializes in the intersection between analytics and information security. He has been securing analytic platforms and their underlying content for well over a decade. In addition to years of platform administration experience, his accomplishments also include the design, construction, and deployment of a novel security control for use with a leading relational database management system.
Session 2 (9:45-10:30): Data Loss Prevention by evaluating and addressing risk.
Abstract: Data Protection is an important consideration for all companies. Why is Data Loss Prevention needed and how does it impact various departments like compliance and legal? Who is after your data and why? We will cover myths that are associated with it and how to separate myth and legend from fact. Lastly, we will discuss how you can create a data-centric framework for your business with respect to Data Protection.
About the Speaker: John Loya is currently the Director of Sales Engineering with Digital Guardian, providing clients with Threat Aware Data Protection solutions. John has been with Digital Guardian for 5 years. Prior to Digital Guardian, John was with McAfee for 9 years in a combination of sales and engineering positions and with Siemens for 9 years as a software developer. John is based out of Orange County, California.
Break 10:30-10:45
Session 3 (10:45-11:30) UEBA & Insider Threat: Comprehensive Architecture for a Zero Perimeter World
Abstract: Today’s security breaches are rooted in people-based vulnerabilities. A key set of tools are required to protect your valuable data from accidental, compromised and malicious users. Visibility and context are key components of an enterprise level security program. By focusing on peoples’ interactions with data, Insider Threat programs prevent behavioral-based data loss and exposes other insider threats that present risk to critical systems, such as fraudulent transactions or cyber sabotage. Combine these tools with UEBA to deliver rich analytics and visibility into a multitude of 3rd Party channels to reduce enterprise risk in an era where threats have surpassed the perimeter. Review large data sets and reduce risk to your organization.
About the Speaker: Ben Bailey is a Solutions Architect based in the Pacific Northwest with Forcepoint, a Raytheon company. An industry leader in delivering advanced analytics and security solutions to the broader market and key contributor to the development of best in class security tools to prevent sensitive data exfiltration. Mr. Bailey has been actively engaged in the architectural design, deployment and implementation of DLP, CASB, UEBA and Insider Threat programs with large enterprise organizations. His background is in data protection and business continuity. Mr. Bailey has served in this capacity for 10 years working with key manufacturers and service providers in the security space.
Session 4: (11:30-12:15) Building data-centric security in a world without borders and full of uncontrollable endpoints.
Abstract: Learn how to gain control over sensitive unstructured information even when it travels beyond sanctioned on-premise cloud services using encryption, global monitoring and dynamic data control across any platform or device.
About the Speaker: Bert Grantges is the VP of Solutions Engineering at Vera. Bert is passionate about applications in the mobile space and data security. His key interests are in business development, strategic relations and architecture for internet and mobile based companies. He frequently speaks on topics mostly centering on threat landscapes and technology. Bert specializes in enterprise technology, software architecture design and development, program management and product management.
Lunch Break (12:15 – 12:30) followed by:
Panel Discussion (12:30 – 1:30) Moderated by ISSA Board members.