ISACA Virtual Summit 2024: Implementing and Maintaining Effective Cyber Practices
ISACA Virtual Summit 2024: Implementing and Maintaining Effective Cyber Practices

Program Catalog

Browse sessions and workshops using the filtering options below.

Filters

Filters

Categories

Day and Time

Type

Conference Domain

Learning Level

Statuses

Welcome to ISACA Virtual Summit 2024: Implementing and Maintaining Effective Cyber Practices

Welcome from our ISACA Host!

SHOW MORE

Sponsored by AuditBoard: Defending Against Cyber Supply Chain Risk in an Interconnected World

Richard Marcus, CISO

The network perimeter can no longer protect you. Critical data is proliferating outside of organizational visibility and control at an accelerating rate — aided by important technological innovations from cloud transformation and the SaaS revolution to the explosion of emerging technologies like AI. Protecting data in this increasingly interconnected world requires new collaborative strategies and a renewed emphasis on key controls such as third-party risk management, data governance, data security, access control, and continuous monitoring. Discover the connected risk strategies enabling cyber leaders to partner with internal and external partners to succeed against this important emerging risk.

Learning Objectives:

  • Identify the trends making supply chain the fastest growing emerging cyber risk category.
  • Learn how to galvanize your internal and external peers to develop partnerships and shared responsibility for cyber supply chain risks.
  • Design and implement effective key controls to mitigate cyber supply chain risks. 
SHOW MORE

First Break

Sponsored by ProcessUnity: Best Practices for Zero-Day Vulnerability Attack Responses & Emergency Assessments

Sandeep Bhide, VP of Product Management

It's not getting any easier. Every time we turn around there seems to be another attack or threat that demands our attention. While each event is unique, they all result in third-party risk management teams scrambling to ensure their organizations are protected. Rapid responses and emergency assessments can be knee-jerk, stressful and distracting. It doesn't have to be that way.

Join us for a discussion on the best practices to responding to zero-day vulnerability attacks and conducting emergency assessments. We'll outline what's required to prepare in advance so you're ready to execute when the time comes. From establishing solid communication channels to leveraging automation, we'll cover the necessary steps and considerations for an effective response plan.

Session attendees will learn:

  • How to gain visibility into your entire vendor ecosystem and prepare in advance to reduce both reaction time and exposure to loss
  • How to quickly identify which third parties require follow-on action based on each specific threat actor or vulnerability
  • How quick-assess campaigns can automatically scope, distribute, and score responses
SHOW MORE

Second Break

Sponsored by Proofpoint: Strengthening Microsoft 365 with Human-Centric Security

Tim Bedard, Director of Product Marketing

Microsoft’s native and add-on email security capabilities help to protect basic email-based threats, but they aren’t enough to ensure full protection. Join our 60-minute session and learn why an effective defense against modern threats like business email compromise, advanced phishing, social engineering attacks, impersonation abuse, and accidental data loss require a people-centric security approach to fortify Microsoft 365 email defenses.

In this session, security experts will discuss: 

  • Today’s top cyber landscape risks
  • Threat trends targeting Microsoft
  • Where to augment Microsoft security
  • How to strengthen Microsoft defenses
SHOW MORE

Conclusion

Load More
ISACA Virtual Summit 2024: Implementing and Maintaining Effective Cyber Practices
ISACA Virtual Summit 2024: Implementing and Maintaining Effective Cyber Practices
  • Overview
  • Agenda
  • Speakers
  • List of Sponsors