Featured
Live Demo: CyberStrong + Snowflake CCA Integration
Michael Blumreich, Senior Sales Engineer | Daniel Lawry, Principal Software Engineer
Join us for a live demo of CyberStrong's Continuous Control Automation (CCA) integration with Snowflake, helping organizations achieve automated continuous compliance at scale.
All episodes
-
STRONGER 2022: How to Build IoT Risk Management Program for an Enterprise
Mani Keerthi, IT Security Manager at Ballard Power Systems
In this session from the STRONGER 2022 conference, Mani Keerthi discussed the growing use of IoT devices for enterprises as it is expected that it will become more prevalent in the future. IoT devices in enterprises have become avenues for threat actors to enter and exploit the enterprise. The question posed is, if we have evaluated the risk of using these devices in the environment, have we considered risk mitigation that is integrated into the enterprise risk management process?
-
STRONGER 2022: Data Security on Cloud
Priya Pandey, Manager - Cyber and Cloud, EY Hong Kong
Secure data management is the most critical requirement when we talk about any organization. We tend to trust on cloud and presume that Cloud Service Provider is responsible for managing and securing the data, whereas Security in the cloud is the customer's responsibility.
In this breakout session from the STRONGER 2022 conference, Priya Pandey discussed the importance of ensuring that organization leaders are aware of their responsibilities and communicate clearly the risk of data breaches to all employees. Security professionals must communicate this to employees as they are an insider risk if they adopt any third-party SaaS application (leading to Shadow IT).
-
STRONGER 2022: Safe locker in Azure Cloud: Key Vault
Abhilasha Vyas, Ph.D., Business Unit Head, Cloud Security and BI at CloudThat
Organizations need to store keys used for encryption and decryption in a safe place. Azure key vault is the solution to that. This session from the STRONGER conference demonstrated key vault creation, key vault management plane access, key vault data plane access policy using RBAC, and backup & restoration of the key vault.
-
Live Demo: CyberStrong + Azure CCA Integration
Michael Blumreich, Senior Sales Engineer
Join us for a live demo of CyberStrong's Continuous Control Automation (CCA) integration with Azure, helping organizations achieve automated continuous compliance at scale.
-
STRONGER 2022: Securing Industry 4.0
Rishabh Das, Advisory Specialist Master at Deloitte
This session from the STRONGER conference introduced the audience to the emerging cyber challenges of Industry 4.0 Transformation. The audience embarked on a journey to explore industry-leading topics like vulnerabilities and risks to critical infrastructure, segmentation, and security in a highly interconnected operational technology (OT) infrastructure. This session also demonstrated two live cyber attacks showcasing OT compromise to the audience.
-
STRONGER 2022: Enterprise IoT Security Sucks - A Story of 2 Million Devices
Brian Contos, Chief Security Officer at Phosphorus Cybersecurity
Working globally with Fortune 500 enterprises and government agencies, we’ve interrogated over two million production IoT devices. Across these two million devices, we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. This presentation from the STRONGER conference covered tactics your organization can employ to recognize value from IoT devices while minimizing risk.
-
Live Demo: CyberStrong + Snowflake CCA Integration
Michael Blumreich, Senior Sales Engineer | Daniel Lawry, Principal Software Engineer
Join us for a live demo of CyberStrong's Continuous Control Automation (CCA) integration with Snowflake, helping organizations achieve automated continuous compliance at scale.