The Enterprise Threat Landscape View

Date: Wednesday, August 31st at 9 a.m. PT / 12 noon ET

In the chaotic wake of Peiter C. Zatko, better known as Mudge's whistle blower complaint and allegations against Twitter's security posture it's time to examine and discuss the "dirty secrets" of enterprise security. We need to ask hard questions. "Are we - the security team - our own worst enemy?" or "Are security teams and their leaders the "canaries in the cyber coal mine" watching fraud & dishonesty overtake the public proclamations "of taking customer security seriously". Is there truly a disincentive for poor cyber hygiene or penalties for "severe recklessness" when executives proclaim security measures implemented to protect data, which appear to be non-existent or overly exaggerated? Despite a myriad of State and Federal regulations with hundreds of millions of dollars in fines levied, many organizations continue to fail at cyber security.

Since 2010, Marriott has suffered at least seven data breaches but, it continues to do business in 2021 to the tune of 13.86 billion U.S. dollars in revenue - unimpeded and unburdened by its security failures. Frustrations mount for enterprise security teams as basic cyber phishing attacks continue to ravage enterprises - as they have done since the earliest days of enterprise email communications. This consums the security teams efforts and reduces the lofty goal of enterprise protection to "cyber janitorial staff" and it's those team members or leadership which pay "the iron price" while the company and board are rarely held accountable for the systemic failure.

Ian Thornton-Trump CD, CISO for Cyjax UK Ltd. and a kindred spirit of Mr Zatko expands on the theme of enterprise threat landscape going far beyond the FUD filled cyber-criminal statistics of Ransomware and endless coverage of APT cyber-attacks. The more existential enterprise landscape threats may be far more deeply rooted. This session will explore those areas which don't make it into the talking points.

Here is the AGENDA for the summit:

9 a.m. PT / 12 noon ET
The Enterprise Threat Landscape View

10 a.m. PT / 1 p.m. ET
Best Practices for Protecting & Recovering Your Enterprise Cloud

11 a.m. PT / 2 p.m. ET
Hottest Third-Party Solutions

Register now!


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.