Breaches & Brews

Breaches & Brews

By Arraya Solutions

Date and time

Tuesday, November 6, 2018 · 3 - 7pm EST

Location

Dogfish Head Brewing Co.

6 Cannery Village Center Milton, DE 19968

Description

Building a Ready-for-Anything Cyber Security Program

Security threats grow and evolve every day. Whether a business is dealing with a cyber attack from a malicious outsider or a breach caused knowingly or not by an end user from within the company, the end result is the same. The immediate costs of a cyber security incident can be extremely high. Long-term, the loss of trust among customers can prove just as damaging.

Building a meaningful security program includes more than just implementing hardware and software security products. Fundamentally successful security involves developing the right strategy, aligning controls with business priorities, implementing meaningful governance, and managing security tools to monitor effectiveness.

Join Arraya Solutions at Dogfish Head Brewing Company on Tuesday, November 6th to discuss best practices for building a ready-for-anything cyber security program. We'll cover the solutions, strategies and tactics necessary to keep your organization secure, while enjoying some great food and delicious brews. Presentations will include:

  • Designing an Enterprise Security Architecture
    There a lot of different approaches to building security infrastructure and systems. This presentation will discuss ways to architect an enterprise level security ecosystem. Topics will include boundary defense, anti-malware, network security, segmentation, monitoring, and much more.

  • Securing Data and the User
    IT administrators focus a great deal of attention on the infrastructure, but usually shy away from the system users where the majority of the risk often lies. This session will investigate ways to get at the user level and monitor what users have access to, what they’re using, and how to detect and respond to suspicious activity.

  • Responding to Threats in Real Time
    Most organizations can’t detect suspicious activity quickly enough to respond to it. This session will focus on Security Incident and Event Management (SIEM) technology, specifically looking at what monitoring should be in place, how to respond to threats, and where SIEM plays a part in the incident response process.

Organized by

Sales Ended