9:00 - 9:30 AM |
Welcome and Keynote
Security Has Gone Haywire: Surviving and Thriving Amid Organizational Evolution
Developments in the use of technology has been turbo-charged in the past 18 months. Organizational engagement with customers and citizens has been reimagined. Running an enterprise, irrespective of size, has evolved dramatically. The pace of change shows little sign of slowing, and organizations are battling to keep up with and get ahead of demand and what their competition is capable of.
The security function has had to turn on a sixpence (or a dime) and security has gone "haywire" in attempts to match the pace of organizational change. What are the biggest concerns of security professionals and CISOs as they navigate the changes they must make as their organizations look to survive and thrive in the new world? What is keeping them awake night? And what can they do to get ahead of the game?
- Maxine Holt, Senior Director, Research
|
9:35 - 10:05 AM |
Data Security:
Ransomware: The New Terrorism
While encryption serves as a fundamental element of data security, when it is used by an adversary to deny organizations access to their own data, the consequences can be devastating. Recent security incidents directed at critical infrastructure have resulted in the United States DOJ and FBI elevating the severity of ransomware to considered on par with terrorism. Ransomware gangs, with ties to criminal organizations worldwide, have been tied to some of the most destructive attacks in recent years. Omdia will outline some of the challenges that organizations face in their ability to prepare for and respond to ransomware attacks and highlight best data security practices to help mitigate the hurdles of this evolving threat.
- Tanner Johnson, Principal Analyst
|
10:10 - 10:20 AM |
Fast Chat:
Tanner Johnson talks to Israel Barack of Cybereason
|
10:25 - 10:45 AM |
Identity, Authentication, Access:
Is Continuous Authentication All It's Cracked Up to Be?
Even before the 2020 coronavirus pandemic forced millions of knowledge workers worldwide to work from home, it had long been a truism that identity had become "The Perimeter". Continuous authentication is a method of identity confirmation on an ongoing basis. In this session we will look at the various types of CA and also explore the pros, the cons, and the challenges of utilizing these technologies over the next few years.
|
10:45 - 11:05 AM |
Break
|
11:05 - 11:35 AM |
Infrastructure Security:
The Decaying Corpse of the Hardware Security Market Gives Life to Cloud-Native and Cloud-Delivered Infrastructure Security
Proprietary hardware-based security solution deployed behind the safe walls of enterprise-owned HQs, data centers, and campuses are flagging, they just don't know it yet…a bit like the famous "I'm not dead" scene in Monty Python and the Holy Grail. And while the vendors who deliver those solutions are coming off record-breaking 2020 sales numbers yelling "I feel happy", the cloud providers and their enterprise customers who are rapidly moving data, applications, and infrastructure into the cloud are standing right behind them with a cudgel. Fear not though, because many of those same vendors, and a slew of new ones, have been migrating existing technology and developing new solutions that are cloud-native, cloud-delivered, or both. In this session we'll look at how Infrastructure security solutions like firewall, DDoS mitigation, web/application security and more will manage the move to the cloud.
- Jeff Wilson, Chief Analyst
|
11:40 - 11:50 AM |
Fast Chat:
Curt Franklin talks to Anand Oswal of Palo Alto Networks
|
11:55 AM - 12:05 PM |
Snapshot Session: Emerging Security Technologies
Beyond CWPP and CSPM: Cloud Permissions Management brings a Zero Touch approach by curtailing entitlements
Cloud workload protection platforms provide runtime security for cloud-based code and data, while cloud security posture management checks for compliance or security drift in apps in the cloud. Both can be considered reactive technologies, but now CPM arises to reduce attack surfaces before any attack happens.
- Rik Turner, Principal Analyst
|
12:10 - 12:20 PM |
Fast Chat:
Rik Turner talks to Kevin Keh of ISACA
|
12:25 - 12:55 PM |
Security Operations:
Rebuilding the SOC Stack: SecOps Priorities & Technologies for 2021 and Beyond
Enterprise cybersecurity operations (SecOps) technology architectures have remained surprisingly static over the past decade. Today, a confluence of long-awaited technology advancements and unexpected global events are ushering in a new generation of SOC capabilities, and with them dramatic ramifications. This presentation will not only examine how industry changes are affecting SecOps business and technical priorities, but also how solutions are evolving to realign and even remake the SOC technology stack.
Specific areas of focus will include:
- Omdia's view of enterprise SOC technology priorities, based on exclusive survey results
- Detailing how Next-Generation SIEM solutions will drive enterprise threat detection & response evolution
- Understanding the emerging XDR technology landscape, and the implications for traditional SIEM-based SOC architectures
- Eric Parizo, Principal Analyst
|
12:55 - 1:35 PM |
Lunch
|
1:35 - 2:00 PM |
Enterprise Security Management:
Turning Users into Cybersecurity Allies: Pushing, Pleading, or Punishing?
Users are never neutral. They are either vulnerabilities to be managed or part of your cybersecurity defenses. What does it take to turn them into allies? Traditional approaches have relied on a triumvirate of threats, rewards, and responsibility to move employees into the "ally" column. But do new technologies mean that the makeup of that trio needs to change? What can technology do for increasing cybersecurity awareness and helping employees move from awareness to ally? Are there technologies that make the employees' role less important? And what are the implications to cybersecurity and your organization's culture of choosing one strategy over another? This session will pack a lot into a few minutes, but you'll come away with a better understanding of what technologies and strategies can (and cannot) do together, or one at a time.
- Curt Franklin, Senior Analyst
|
2:05 - 2:15 PM |
Fast Chat:
Maxine Holt talks to Adam Bromwich of Broadcom
|
2:20 - 2:30 PM |
Snapshot Session: IoT Cybersecurity
Now a Matter of Life and Death: The Expanding IoT Threat Landscape in Healthcare
The IoT in healthcare is an attack vector and attackers have a choice. Option 1: Use the IoT to access PII and/or compromise the systems that run the healthcare organization. Option 2: Render IoT devices inoperable to disrupt healthcare provision. Neither of these options is acceptable to the healthcare organization, but they are a risk that must be assessed and addressed. Join this Omdia snapshot session to hear about the significant rise in IoT devices in healthcare and what organizations must consider to protect the health and well-being of their patients.
- Hollie Hennessy, Senior Analyst
|
2:35 - 2:45 PM |
Snapshot Session: Emerging Security Technologies
Zero Trust Access: The VPN replacement technology becoming the tail that wags the SASE dog
When the SASE paradigm, in which networking and security technologies are bundled and delivered from the cloud, was announced in 2019, it looked like Zero Trust Access was added as an afterthought after the network, SD-WAN, firewalls, secure Web gateways, and CASBs. 18 months and on pandemic later, and ZTA has become the key component that no SASE worth its salt can do without.
- Rik Turner, Principal Analyst
|
2:45 - 3:05 PM |
Break
|
3:05 - 3:30 PM |
IT Security Services:
Building an Interlaced Security Armour Through the Fabric of Security Services
End to end cybersecurity for large enterprises and government is complex, and a rapidly evolving advanced threat landscape raises the stakes. But not all CISOs and CIOs are well prepared for tough challenges ahead. Now, more than ever, organizations need help to build critical internal security capabilities, augment these with a third-party security provider, and consider partnering for longer term success.
Attend this session to hear about the key organizational cybersecurity challenges facing every CISO and what to expect from a global leader in cybersecurity services.
|
3:35 - 3:45 PM |
Fast Chat:
Adam Etherington talks to Theresa Lanowitz of AT&T
|
3:50 - 4:30 PM |
Live Q&A with Omdia Analysts
Join this live Q&A session with some of today’s analysts to ask any questions that you might have from today’s presentations or indeed anything else #cybersecurity that you might want to ask!
|