Day One : Friday, November 20, 2020
10:00 EST10 min
Welcome and Opening Remarks from the Chair
10:10 EST60 min
- IPC privacy investigations
- Preventing and responding to breaches
- Breach notification
- Guidance on working from home during the pandemic
- Privacy advice on phishing, ransomware, portable devices, destruction of records, de-identification
11:10 EST60 min
- 5G is a next-generation mobile network technology that can enable an astonishing range of innovative new products and services and offers the promise of significant economic and social benefits as well. However, like many emerging technologies, it is equally likely to disrupt multiple industries
- The arrival of 5G and the growth of IoT devices are guaranteed to affect the cybersecurity landscape, it is so imperative that companies proactively assess their security strategies and data security
- 5G also introduces critical concerns around data security and privacy that Cyber Security and Privacy professionals need to understand, mitigate and manage.
- This session will establish a clear understanding of the essentials around 5G & IOT from a privacy and security perspective
- This session will discuss why deploying a risk-based approach to security will be critical, ensuring that high-risk areas are seen as the biggest priority, in order to minimize damage
12:10 EST60 min
13:10 EST60 min
- Benefits of Covid-19 in adapting Telecommuting workforce in many companies including ‘fortune 500’
- What are the acceleration drivers behind this shift in Technology & lifestyle?
- Cybersecurity policies are the principal difference between being on premise and remote
- How to develop a state of art and secure Telecommuting Strategy
- Scale through secure and trusted solutions. Is the cloud a safe place?
14:10 EST20 min
14:30 EST60 min
- What is a business email compromise and why / how does it still happen?
- Identifying the applicable laws and regulations, establishing a legal privilege strategy, and high level audit
- Assessing the scope of the breach and determining reporting (to privacy commissioners) and notification requirements (to affected individuals)
- Remediating the breach and “lessons learned” exercise, including common quick wins and some less common WFH considerations
- Best offense is defense – how to prepare for any type of breach with comprehensive cyber, legal and communications services
15:30 EST60 min
Redefining the Security Perimeter: Why Protecting Identities is More Important Than Network Security
- Digital transformation, the cloud and working remotely have made the traditional perimeter-based network defense obsolete. In these unprecedented times, forcing remote users through internal Network infrastructure creates performance bottlenecks and often does more harm than good.
- Strong Information Security teams operate with an “assume breach” mentality making a VPN connection no longer enough to assure secure access of apps and data. Enter the Zero-Trust security model.
- With the proliferation of SaaS applications, mobile devices and cloud services, the security perimeter has been redefined. “Never Trust, Always Verify” is the new mantra in which just enough access is granted to strongly authenticated identities on secure, compliant devices in verified locations. These modern security concepts are what makes Identity and Access Management so important, and why identity must be recognized as a modern security perimeter.
- Attendees will learn about the prevalence of identity based attacks, the history and current state of Zero Trust and how they can protect their users by applying modern security principles around their identities and data. Topics covered in this session are especially important as more organizations have shifted to a work from home model due to the recent Covid-19 pandemic
Closing Remarks from the Chair