Ransomware attacks are increasing with alarming speed – there were twice as many ransomware attacks in the first half of 2021 as there were in all of 2020.
If you’re a CISO who loses sleep wondering if today is the day you get a ransom note for your data, then join Argyle and our partners for the CISO Leadership Forum on February 17, 2022.
You’ll hear from your information security peers how you can prepare for threats while being a good steward of your enterprise data.
Attend this virtual event to learn:
Digital transformation of business operations creates an enormous amount of change. What has not changed is the need for enterprises to keep their data consistent, secure and auditable. Migration to the cloud has put managers under pressure to prioritize usability at the expense of consistency and security.
Join us for a timely presentation on how to position your business for future success by understanding an approach to embed security into your global supply chain to provide a consistent, auditable approach to data management.
You will learn:
Chief Technology Officer and Vice President of Technology
Security is a multi-step process. Choosing the right tools, platforms and partners will make the journey easier and more successful. There is no silver bullet – everyone must do their part. But – you need not be an expert in everything; with the right platform, the hardest parts are made simpler. Frances Ho is the Director in charge of security for the Java platform and is directly responsible for helping secure hundreds of millions of systems around the world. In this session, she’ll provide actionable, real world advice that you can use to keep your systems secure.
You will learn:
• Tools and features that save users time
• The Java crypto roadmap: preventing unpleasant surprises
• How to strike a balance between bulletproof security and user-friendly systems
Senior Director, Java Product Management
Software Development Director, Java SE
Remote and hybrid work has made data governance more complex. As enterprises migrate on-site data to the cloud, it is essential to clearly communicate governance expectations for all platforms.
Without frequent, clear communication of data governance practices, procedures and philosophies, data governance will become a serious pain point.
Join this panel discussion for a lively review of data governance best practices and how to communicate those best practices to your stakeholders.
You will learn:
Vice President, Cybersecurity and Data Protection
Head of Data Governance
Vice President, Head of Analytics EMEA
Managing Director, Data and Analytics, Global Services
Cloud Native environments have the potential to be more secure than ever before. But Security teams must collaborate with new teams, like DevOps, and learn the security requirements of a nascent space. Although Cloud Native environments are new territory, familiar processes of policy setting are not only still applicable, but essential. Join this session for a discussion of key policies required for securing a Cloud Native environment.
You will learn these top 10 Cloud Native security policies:
#1 – Open source software acceptable use and supply chain
#2 – Reasonable image risk tolerance
#3 – Image content, properties and configuration
#4 – Multi-cloud security posture and configuration parity
#5 – Treat Kubernetes like a small (but complete) datacenter
#6 – Minimal human access to servers (or preferably none at all)
#7 – Workload least privilege and minimal configuration
#8 – Immutability and quick workload replacement
#9 – Cross-cloud, cross-cluster, zero-trust network access
#10 – Apply all policy controls repeatedly at every stage
Cloud Native Security Advocate
The Biden Administration’s recent Executive Order on Improving the Nation’s Cybersecurity and a group of cybersecurity bills that have passed the House of Representatives last year have the potential to reshape the cybersecurity landscape for both the public and private sectors. Improvements to the federal government’s cybersecurity, including enhanced information sharing and better securing the software supply chain have implications for private sector CISOs, but what are they? Join us to learn how you can position your business for success in the new cybersecurity regulatory and legal environment.
You will also learn:
Head of Information Security
Recruiting professionals with sophisticated Information Security skills has never been easy, and the Great Resignation has made it feel impossible! Faced with an information security labor market that is tighter than it’s been in a generation, what can recruiting professionals do to source the talent their enterprises need?
Join is for a real-world panel discussion on what you can do as a recruiter to build high performing information security teams in today’s unpredictable business environment.
You will learn:
CEO and Executive Coach
Head of Global Talent Acquisition
Chief Information Security Officer
Global Chief Information Officer and Chief Information Security Officer
We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.