SecWest Bonus Session: Connected Everything: Zero Trust Security Hygiene for Infrastructure Access for IT & OT
The state of IT/OT security has evolved. Keeping up with this evolution requires adopting a Zero Trust secure access framework. This discussion will focus on how today’s distributed IT/OT environments are challenging organizations to provide secure remote access for 3rd parties and global partners to monitor and administer IT/OT systems.
We will discuss the following key elements of defining a secure framework for implementing remote access for IT/OT:
SecWest Bonus Session: Evolve your SOC and Defend Your Cloud Environment
Are you straining to scale your security analysts and defenses to stop attackers? If so, you’re not alone. Combating today’s threats requires new approaches to protecting your cloud environment and how your SOC manages its data, analytics and expertise. Join Devo as we explore innovative ways your security team can thrive in the era of the shift to the cloud, massive data growth, talent shortage, and constantly evolving threats with:
•A SIEM solution that scales and ingest all your data to deliver full visibility into threats
SecWest Bonus Session: Pentera 101: Changing the Game of Offensive Security
This session is to walk through a demonstration of Pentera: The Automated Security Validation solution. Organizations over the years have been following a defense in depth model to protect their critical assets. While this strategy makes sense; the tools, processes, and procedures surrounding this initiative have grown significantly. How confident can organizations be that each layer and the enormous effort undertaken is working effectively? Jay Mar-Tang will take the time to walk through how Pentera can validate which risks are present, which mitigative efforts are working efficiently, and how security practitioners of all expertise can leverage Pentera both internally and externally to know with certainty how strong the security posture actually is.
SecWest Keynote: Threat Hunting with ML and AI
Join David Hoelzer for an exploration of some real-world applications of machine learning and artificial intelligence in cybersecurity. Can these techniques be useful today? Is it possible to use these technologies to accelerate threat hunting and incident investigations? Come to this talk and demonstrations to find out why the answer is a resounding “Yes!”