fbpx

Securing Everything: An Introduction to Zero Trust

Who can you trust? If you are following a strict zero trust philosophy, the answer is no one and nothing. Is this achievable? Is it practical? Does it even make business sense? Can any vendor or tool provide zero trust? This session will discuss the principles that underly the zero trust philosophy along with providing […]

Read more

Cyber Risk Assessment Capabilities for all Stakeholders

Cyber risk is no longer an isolated InfoSec function in the enterprise. It has far reaching impacts effecting other risk categories in the organization that need to be considered by all stakeholders and incorporated into the overall enterprise risk management strategy. In this Breakout session we’ll discuss how cyber risk can be assessed across the business […]

Read more

Looking Through the Eyes of an Attacker: Targeting Active Directory in the Retail Industry

Active Directory (AD) is a primary source of entry for attackers. The reason? It’s an easy target. AD is widely used in retail organizations, and most often regarded as operational infrastructure rather than a gateway to high-value assets and data that requires security measures such as cyber-hygiene and attention to configuration mishaps. Grab a seat […]

Read more

Vulnerability Management and Discovery at Colgate-Palmolive: Information Sharing Session

Please come prepared to share your vulnerability discovery best practices! This session will begin with an overview of how Colgate-Palmolive approaches vulnerability discovery. They’ll focus on both the tactical perspective of how they organize a vulnerability management program, as well as a more strategic look at the broader culture shift needed so that security is […]

Read more

Zero Trust for Frontline Workers

By now, many of us have heard about the benefits of zero trust for information workers, especially those working remotely. But what about the frontline retail and hospitality workers? Join this session to learn more about how you can take steps to protect your users and your data with a modern zero trust approach.   Sponsored by: […]

Read more

Supporting and Protecting Customers and Partners from Cybercrime

The impact of cybercrime on the economy, personal lives, and our business community is growing exponentially each year. Loss estimates are in the trillions worldwide. The public and private sectors are coming together to answer two critical questions that need to be addressed on a national level in the U.S. Where does a consumer or […]

Read more

Third-Party Cybersecurity Risk: Supply Chain Integration

Learn how an industry-leading consumer food products organization approaches their third-party cyber risk and supply chain integration practices. Speakers Catherine Gross and Laurie Rupe share an overview of General Mills’ cybersecurity organization, outline the current state of their third-party security risk assessment program, describe their approach to supply chain integrations, and discuss short- and long-term […]

Read more

Is Your eComm Presence Ready for the Holiday Shopping Season?

This past spring, our eComm Pinnacle series showcased how retail and hospitality companies can reach the pinnacle in their security, efficiency, and customer privacy efforts of their digital environment. RH-ISAC partners in this effort have drafted a eComm Framework, providing the top security controls you should have in place for your websites and mobile apps. […]

Read more

Security Life for Small Teams

Michael shares an important leadership perspective for cyber teams who are working with limited resources. He’ll discuss The Cosmopolitan of Las Vegas’s security architecture methodology and the cultural implications including his approach to training and skillset development, the unforeseen benefits of working with a smaller group, and recommendations for other CISOs and leaders in a […]

Read more

The Challenge of Detecting Threats in the Cloud

Detecting threats in the cloud presents several challenges: dealing with new technologies, facing new threat scenarios, and accelerated cloud adoption as exacerbated by the COVID-19 pandemic Gartner indicates that organizations have been expanding their adoption of cloud security-oriented tools, such as Cloud Security Posture Management (CSPM) and Cloud Access Security Broker (CASB), as they try […]

Read more