How much is cyber security compromise costing Canadian organizations? Does confidence exceed preparedness? Are employees trained to identify a scam? How is the threat landscape evolving, and are we changing with it?
Please join us on March 13th for answers to these and other questions regarding Canada’s cyber security landscape and the key trends among the country’s organizations. Scalar has surveyed over 400 IT security and risk & compliance professionals to determine how prepared Canadian organizations are for cyber threat.
Theo Van Wyk, Chief Security Architect at Scalar, will be offering analysis of our study’s results, and insights into current market trends. Following his presentation, we want you to learn how to take the insights and turn them into actions. How do you select the right partner or technology to prepare, defend, and respond to today’s threats?
This event will offer both technical and business-level breakout sessions from our partners F5, Splunk, Palo Alto Networks, ServiceNow, and Microsoft, who will provide in-depth insight into:
Secure your seat for Scalar’s Security Day. RSVP now.
Protecting your data starts at layer 7.
Today, apps are your business. With this app-centric environment comes new risks—86 percent of data breaches now occur at the app level. Protecting your data, and your business, requires integrated security solutions to defend critical areas of risk. You need to manage risk everywhere, including the cloud.
Traditional network-based security solutions focus on network protection and are blind where attacks live: in the application. Ubiquitous TLS encryption protects private traffic, but it also protects attackers from your security tools. F5’s TLS-enabled proxy eliminates this blind spot and provides necessary visibility to analyze and enforce your security policies for all application traffic, allowing you to make decisions based on the potential risk to the application and take necessary action. These solutions run where you need them to run—as software, standalone hardware, virtual appliances, and in the cloud. Only with visibility into the channels attackers are exploiting within your applications, will you be able to defend against today’s threats to your data.
Speaker: Robert Wagner – Security Strategist, Splunk
There is never enough budget or time to solve every security problem an organization faces.
However, there are a lot of free or inexpensive tactics and techniques that every organization can leverage to make it harder for attackers to enter your environment. This presentation is a collection of tips and tricks learned from pen-testers and hackers around the world. We’ve compiled the tactics that either stop them in their tracks, or make their lives much more difficult. We’ll leave you with actionable tips to fill your security gaps and help reduce your attack surface.
Palo Alto Networks
Speaker: Chris Cram – How the Pentest team and malicious adversaries hacked your corporate environment
Most organizations with a mature security posture have gone through security audits like a vulnerability assessment, risk assessment, or some other form of security analysis. Penetration testing is a key component to validate the security posture of your environment. In most cases the goal of penetration testing and malicious threat actors are similar such as trying to gain unrestricted access to a computer asset within the environment, obtain critical data, and ultimately compromise the entire domain (not always the goal but if they can get it). This talk will go over the main ways that a corporate environment can be compromised and the techniques that are used to carry out such attacks. Defense in depth strategies are the best defence against cyber-attacks targeting corporations.
Speaker: Oles Bulygin
A large part of Microsoft’s business is to provide technology via cloud services to our customers and partners. From the top down, we recognize that the trustworthiness of our platforms is a core requirement for that business and we are committed to providing trustworthy platforms. What many people don’t realize about Microsoft is that we’ve had a deep commitment to (and investment in) security for over 15 years now. The trustworthy computing memo that famously caused the halting of Windows development (and the release of a security-focused XP SP2 release) turned 15 years old in January 2017. Join this session to learn the key features of the Azure Security Centre and how you can gain real benefits to your security posture today.
Why Canada Needs to Prepare for GDPR
Speaker: Benjamin A Boi-Doku – Practice Leader, Cyber Risk and Security – Scalar Decisions
On May 25, 2018, the new EU General Data Protection Regulation (GDPR) takes effect, and the penalties for ill preparedness will be significant. The scope of the GDPR is not limited to organizations that have a physical presence in the EU or that are actively targeting users located within the EU. Compliance to GDPR will apply to businesses that are collecting or processing personal data of individuals who are in the EU and where the processing activities are related to: offering goods or services to an individual in the EU; or monitoring the behaviour of individuals that occurs in the EU. If your organization collects any data on citizens of the European Union, it’s time you start preparing for compliance to the new global standards. Our Risk Advisory Services team are conducting Data Protection Impact Assessments as required by GDPR Article 35. This is required of all data controllers and processors as defined in the regulation.
Benjamin A Boi-Doku, Scalar’s Practice Leader, Cyber Risk and Security will lead an in depth discussion around a Canadian perspective on global awareness of data protection laws and what changes need to be made immediately in order to ensure compliance.
Palo Alto Networks:
Speaker: Garry Coldwells – Manager, Major Account Systems Engineering – Palo Alto Networks
Are you challenged with ensuring business growth and profitability while quickly delivering new apps and services to enable core functions safely?
Do you strive to simplify internal workflows and drive better productivity while mitigating business risk?
Join Scalar and Palo Alto Networks to learn about Traps multi-method exploit prevention capabilities and the newly-launched Managed Traps Zero-day Endpoint Protection Service. By leveraging a multi-method threat prevention approach that combines the most effective, purpose-built, malware and exploit prevention methods, we’re able to protect endpoints from both known and unknown malware and exploits so you can focus on managing business growth and driving productivity.
In this session, we will discuss:
Transforming the Way Enterprise Security Response Works
Speaker: Bill Conrad – Advisory Solution Consultant
There are numerous elements impacting corporate risk. Some of these include cyber security risks through exposure from known vulnerabilities, increasing quantity and quality of attacks, scarce and expensive capable human resources, limited budgets, and increasing regulatory compliance fines.
If there was ever a time and place to arbitrage automation for humans, this would be it. Leveraging structured, consistent automation and orchestration in the investigation and response process to a cyber security incident is the key for prioritizing and acting faster. Join us to review the current state and walk through two use-cases that exemplify identification, containment, and response for the inevitable next cyber security incident.
Securing applications in a Hybrid Environment
Protecting your data starts by thinking App Security First.
Today, apps are your business. With this app-centric environment come new risks—86 percent of data breaches now occur at the app level. Protecting your data, and your business, requires integrated security solutions to defend critical areas of risk. You need to manage risk everywhere, including the cloud. Traditional network-based security solutions focus on network protection and are blind to application context. F5’s ability to eliminate the blind spot caused by encryption provides necessary visibility and analysis for all application traffic, so you can make decisions based on the potential risk to the application and take necessary action. These solutions are delivered where businesses need them—as software, standalone hardware, virtual appliances, and in the cloud. Only with visibility into all the weak points attackers are exploiting within your application, will enterprises like yours be able to protect their data.
Speaker: Deepak Rout
We can make better decisions about how to prepare, if we know about historical triumphs and tribulations. Join the team from Microsoft as we take you through the evolution of IT, threats, and security in the context of today’s cloud and mobile world. We’ll discuss organized crime and nation state attacks, and how enterprises can defend against modern day threats. As the landscape evolves, so should your security strategy. Are you ready for shared responsibility in cloud? We’ll assist you in understanding how to destroy the attackers’ ROI and tangible next steps to support your secure journey.
In partnership with:
Sign up to be notified about our upcoming events and connect with the Scalar team.