Breaches & Brews
Date and time
Location
Dogfish Head Brewing Co.
6 Cannery Village Center Milton, DE 19968Description
Building a Ready-for-Anything Cyber Security Program
Security threats grow and evolve every day. Whether a business is dealing with a cyber attack from a malicious outsider or a breach caused knowingly or not by an end user from within the company, the end result is the same. The immediate costs of a cyber security incident can be extremely high. Long-term, the loss of trust among customers can prove just as damaging.
Building a meaningful security program includes more than just implementing hardware and software security products. Fundamentally successful security involves developing the right strategy, aligning controls with business priorities, implementing meaningful governance, and managing security tools to monitor effectiveness.
Join Arraya Solutions at Dogfish Head Brewing Company on Tuesday, November 6th to discuss best practices for building a ready-for-anything cyber security program. We'll cover the solutions, strategies and tactics necessary to keep your organization secure, while enjoying some great food and delicious brews. Presentations will include:
-
Designing an Enterprise Security Architecture
There a lot of different approaches to building security infrastructure and systems. This presentation will discuss ways to architect an enterprise level security ecosystem. Topics will include boundary defense, anti-malware, network security, segmentation, monitoring, and much more.
-
Securing Data and the User
IT administrators focus a great deal of attention on the infrastructure, but usually shy away from the system users where the majority of the risk often lies. This session will investigate ways to get at the user level and monitor what users have access to, what they’re using, and how to detect and respond to suspicious activity.
-
Responding to Threats in Real Time
Most organizations can’t detect suspicious activity quickly enough to respond to it. This session will focus on Security Incident and Event Management (SIEM) technology, specifically looking at what monitoring should be in place, how to respond to threats, and where SIEM plays a part in the incident response process.