InfoSec Conference Summary
The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.Add this conference to your favourites
As enterprises forge deeper into the digital realm, managing risk and security become even more important for senior information technology and security executives. And in today’s global, multi-cloud, multi-generational workplace, there’s risk in every corner – and the board wants to know what you are doing about it.
SecurIT is the place where senior decision-makers come to learn from peers and experts, and explore information security solutions to enhance their security posture.
Join CSO & our partners who will provide insights into building a robust security strategy as well as a collaborative environment so that organisations can be confident that they are spending in the right areas.
Security is an issue for every function within an organisation, and both legacy solutions and emerging technologies have the potential to create vulnerabilities. Cloud computing, data & analytics, IoT, employee activity, third-party partnerships…organisations need to be aware of risks and threats in these areas and others.
Executives in infosecurity and IT need to work together, and with other business functions, to identify core assets and develop defenses and education to protect them. And all senior executives need to understand the rapidly evolving security landscape to guide the strategy and advise the board. SecurIT, through IT and security executive keynotes and your content, will give IT, security and business decision-makers a holistic view of techniques and solutions for protecting data, assets, customers and employees. Join us to be part of this critical dialogue and make the connections that will put your solutions in the hands of those who need them most.
Topics Will Include:
Zero Trust | Blockchain | Speaking to the Board |Behavior Monitoring & Analysis | Big Data Analytics | Security Intelligence | Biometrics | AI | Governance & Compliance Mandates | Security Best Practices| Insider Threats | Security Safeguarding | Password Management | Data Governance & Security