0% found this document useful (0 votes)
3 views3 pages

September Virtual Summit Agenda 1693494301250

The document outlines a schedule for a cybersecurity program event featuring various sessions sponsored by different companies. Topics include data security in hybrid environments, achieving compliance with SOC II and ISO 27001, driving cyber resilience, and empowering cybersecurity champions within organizations. Each session includes expert speakers and covers best practices and strategies relevant to modern cybersecurity challenges.

Uploaded by

賴威宇
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

September Virtual Summit Agenda 1693494301250

The document outlines a schedule for a cybersecurity program event featuring various sessions sponsored by different companies. Topics include data security in hybrid environments, achieving compliance with SOC II and ISO 27001, driving cyber resilience, and empowering cybersecurity champions within organizations. Each session includes expert speakers and covers best practices and strategies relevant to modern cybersecurity challenges.

Uploaded by

賴威宇
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

*Please note these times are subject to change*

9:00 AM – 9:05 AM CT: Welcome to Building a Viable Cybersecurity Program

9:05 AM – 9:55 AM CT: Sponsored by Netwrix: Data Security in a Hybrid World


Speaker: Jeff Warren

As your organization expands to new cloud environments, the job of securing sensitive data
becomes increasing difficult. Join this session as we dive into innovative strategies to overcome
the data security hurdles posed by modern hybrid and multi-cloud environments.

We’ll cover:

• Best practices for safeguarding data in a hybrid IT environment


• The capabilities and limitations of native security tools, like E3/E5 and Purview in Azure
and Macie in AWS
• Effective techniques for strong data protection, compliance, and governance across Azure,
M365, AWS, GCP and other cloud platforms

5 Minute Break
*Subject to Change*

10:05 AM – 10:55 AM CT: Sponsored by ProcessUnity: Work Smarter, Not Harder:


Achieve SOC II and ISO 27001 Compliance
Speaker: Andrew Egoroff

Join ProcessUnity to understand where the two standards align and how you can use that
alignment to reduce redundancy in your compliance efforts. You’ll learn key strategies for cross
walking SOC II, ISO 27001 and internal policies, allowing you to achieve and maintain multiple
cybersecurity standards at scale.

In this webinar, you'll learn:

• The key similarities and differences between SOC II and ISO 27001
• The advantages of achieving ISO 27001 with SOC II crosswalk
• How to identify where to crosswalk controls between the two standards to avoid
duplicative efforts
• Best practices for maintaining compliance in a fast-growth environment

5 Minute Break
*Subject to Change*
*Please note these times are subject to change*

11:05 AM – 11:55 AM CT: Sponsored by ServiceNow: Drive Cyber Resilience with Enterprise Security
Case Management
Speaker: Karl Klaessig

In this webinar, you will learn how to rapidly respond to evolving threats while optimizing and
orchestrating enterprise security operations. You will be able to enable your teams to eliminate
the errors and friction of manual handoffs across systems, teams and responsibilities. Instead,
Integrations, playbooks, dashboards, and a common data model for enterprise case management
expedite investigation, response, and remediation across IT, Security, and Risk teams to minimize
incident impact, data loss, and exposure. This drives the maturity of your security operations, and
centralizes case management for threats, data loss events, and more.

5 Minute Break
*Subject to Change*

12:05 PM – 12:55 PM CT: Sponsored by Hyperproof: How to Truly Empower Your Cybersecurity
Champions
Speakers: Esmond Kane & Kayne McGladrey

In today’s increasingly technology-reliant world, there’s no room for negligence in cybersecurity


risk and compliance management. Your number one threat to cybersecurity is human error, so it’s
more critical than ever for all employees to be equipped to advocate for cybersecurity best
practices and requirements.

Join us for our session where we’ll help you learn how to turn non-security professionals into
champions of your cybersecurity programs and initiatives to infuse security and compliance
throughout your organization at every step.

Join us to learn:

• How to identify the best possible cybersecurity champions


• What cybersecurity practices to educate possible champions on
• How to keep cybersecurity champions engaged over time

12:55 PM – 1:00 PM CT: Conclusion


A very special thank you to our Sponsors:

Platinum Sponsors:

Gold Sponsors:

Supporting Sponsor:

You might also like