Cybersecurity's Changing Role in IT
The Critical Next Steps in IT’s Evolution – and How Cybersecurity Will Fit In
Earn (ISC)² CPE Credits | Gain Unlimited Access for FREE
No matter how your enterprise’s IT organization is evolving, security will play a crucial role in your strategy. Whether you’re undergoing digital transformation, adding capabilities for remote workers, moving toward the cloud, implementing 5G networks, or taking a "Shift Left" approach to application development, you will need to make critical decisions about cybersecurity tools, techniques, and practices. In this unique event, you’ll have an opportunity to look at today’s most formative IT trends from a security point of view.
Whether you’re an IT professional who needs to understand the security implications of a new project or a security professional who needs to understand IT’s latest directions, this virtual event is for you. In a series of keynote presentations and expert panels, you’ll get insight on the latest trends in cybersecurity – and how they might affect the threat surface of your organization. You’ll get tips on how to minimize the cyber risk of next-generation applications and services. And you’ll get advice on how to harmonize the processes used by both the IT team and the cybersecurity team.
Meet Our Keynote Speaker
Elena Kvochko, Technology and Cyber Security Executive
Elena Kvochko serves as Chief Trust Officer at SAP. The Chief Trust Office team spans four continents enabling secure digital transformation of clients across global cloud products. Prior to this position, she served as Senior Vice-President and Technology Executive at Bank of America. Previously, she worked as a divisional Chief Information Officer at Barclays Bank. Her focus was on delivering the highest degree of privacy and security of customers and employees globally.
Elena served as an affiliate fellow at Harvard Law School and worked at the World Bank headquarters in Washington DC. Her published work appeared in Forbes, Harvard Business Review, featured in the Wall Street Journal, the White House cybersecurity report, The New York Times, and multiple industry media. She has invented patent-pending technologies in cybersecurity, privacy, and secure financial technologies. Throughout her career, she has been a strong advocate in national cybersecurity and technology diversity programs, and a lecturer and speaker at national and international Universities.
This event is a unique opportunity to learn about the security implications of today’s most important IT trends. You’ll learn how security considerations affect the way your enterprise works with cloud service providers, how to secure the huge base of remote endpoints, how to add security to the DevOps direction, just to name a few. Additionally, we've partnered with (ISC)² to offer attendees the ability to earn CPE credits.
Among the topics that will be covered at Cybersecurity's Changing Role in IT:
- An overview of the changing role of cybersecurity in the IT department, and how security roles and IT roles are increasingly overlapping
- A look at some of the most widely used cloud services, and how to ensure the security of your data while expanding your applications of cloud technology
- Insight on some of the weakest security links in today’s enterprise networks, and how to build a stronger and more comprehensive network security strategy
- A look at next-generation application development strategies, including DevOps and Shift Left, and their implications for cybersecurity
- Insights on artificial intelligence and machine learning, and how these emerging technologies might be used both to attack your organization and to defend it
- Tools and techniques for connecting and harmonizing the activities of IT operations and security operations, particularly in the discipline of incident response
Keynote | Baking Cybersecurity Into Enterprise IT
Elena Kvochko, SAP
Years ago, the security team (if there was one) and the broader IT team often operated separately, sometimes at odds with each other. Today, cybersecurity has become a pervasive issue in almost every area of IT, from the network to the help desk to application development. What role should cybersecurity play in next-generation IT programs and practices? How can security become less of a silo and more directly integrated into all phases of IT? In this keynote, Elena Kvochko, SAP's Chief Trust Officer, discusses new approaches and tools to help IT organizations and security teams work better together.
Tech Talk | Symantec CloudSOC Mirror Gateway: Solving the Unmanaged Device Problem
Panel | Network Security for 2021 and Beyond
Meg Diaz, Cisco | Timothy Mullen, George Sink P.A. | Jeff Wilson, Omdia | John Pironti, IP Architects
Moderator: Kelly Jackson Higgins, Dark Reading
Even before COVID-19 struck, IT organizations were making huge strides in the implementation of next-generation network technology such as SASE, 5G and software-defined networking (SDN). Today, those organizations are faced with a whole new spectrum of challenges as many employees and trading partners continue a remotely operated computing model. In this panel, experts discuss the impact of emerging networking strategies on cybersecurity tools and processes, as well as the latest cyber threats to enterprise networks. You’ll also get recommendations on how to integrate and harmonize the elements of IT operations and security operations.
Tech Talk | Complete Network Visibility & Control - Your next step for network security.
Panel | Building Security Into Enterprise Application Development Processes
Stephen Gates, Checkmarx | Kristen Bell, GuidePoint Security | Brad Causey, Zero Day Consulting | Moderator: Ericka Chickowski, Dark Reading
Today's application development teams are implementing new strategies and processes every day, from DevOps to Shift Left approaches. How can your IT team bake security into the software development life cycle? In this panel discussions, experts from both the app dev side and the security side join to discuss the tools and processes enterprises can use to create secure applications in record time.
Tech Talk | Scorecard Platform Workflow
Panel | The Future of Authentication
Bassam Al-Khalidi, Axiad | Eric Brown, SAIC | Fred Kwong, Delta Dental | David Levine, Ricoh USA | Moderator: Sara Peters, Dark Reading
With the global pandemic continuing to keep employees, customers, and suppliers at home, the challenge of remote authentication has never been more critical. Yet, many enterprises are still relying on old, flawed password strategies to protect crucial data. In this panel, top experts discuss the latest tools and practices for multifactor authentication, and strategies for replacing outdated password schemes. Attendees will learn about emerging methods of ensuring that end users are who they say they are, as well as strategies for implementing authentication not only for individual applications, but for all applications across the enterprise.
Tech Talk | DevOps: Innovating with Speed, Security and Quality
Panel | AI and Machine Learning: Implications for Enterprise Security
John Trest, Inspired eLearning | Kevin O'Brien, GreatHorn | Diana Kelley, SecurityCurve | Ted Wagner, SAP NS2 | Moderator: Ericka Chickowski, Dark Reading
The rapid growth of artificial intelligence and machine learning technologies is driving a sea of change in enterprises’ approaches to IT. But how will these ground-breaking technologies affect cybersecurity policy and strategy? In this panel discussion, experts discuss the steps that organizations must take in order to secure the ongoing operations of AI and machine learning technologies. You’ll also get insight on how your team can use AI and ML to improve enterprise security – and how the bad guys might use these emerging technologies against you.
Tech Talk | Automating Threat Detection and Response with SecOps Intelligence
Tech Talk | Intelligence Powered Threat Detection
Tech Talk | Simplify Intelligent Power and Physical Security with Chatsworth Products eConnect® Solutions
We partner with (ISC)² to provide credits for Interop. 1 credit is awarded per one hour of security-themed sessions attended, with a maximum of 8 per day. CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.
It’s simple: enter your (ISC)² member number on the Interop registration profile page. If you have already registered for Interop you can log back in to your profile and add it. Following the live event on April 29, Interop will submit your security-themed session attendance to (ISC)² so the credits can be added directly to your account. Any on-demand activity will need to be self-submitted. If you need to add your (ISC)² number to your profile, send an email to [email protected].
All educational opportunities offered by the submitter as eligible for CPE credits shall be of the highest quality, directly related to at least one (1) domain of information security as recognized by (ISC)².