{"id":722,"date":"2018-09-11T08:23:05","date_gmt":"2018-09-11T08:23:05","guid":{"rendered":"http:\/\/logichunt.net\/demo\/wordpress\/emeet\/?page_id=722"},"modified":"2024-12-12T10:35:15","modified_gmt":"2024-12-12T08:35:15","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/security-leadership-sweden\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
By identifying your desired CISO type, you can then seek out opportunities where your strengths and interests match the needs of the company, so that you can be the optimal fit for the company\u2019s strategy.\u00a0 This session will give you the framework to do two key things:<\/p>\n
Protecting data must look different!\u00a0To safeguard data from emerging threats, today\u2019s businesses need comprehensive and multi-faceted tools that transcend traditional \u2018backup\u2019 for holistic protection, compliance, and recoverability.\u00a0A new way is needed that focuses on the security, durability, and the recovery of data for organizations to remain resilient and survive.\u00a0One that is progressive, meets threats head-on with advanced capabilities that safeguard entire data estates without sacrifice.\u00a0Commvault has been a Gartner Magic Quadrant leader for 12 years. More than safeguards more than 100,000 organizations around the world rely on Commvault and they secure 3 EB of cloud data and have a unique FedRAMP High cyber resilience platform.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7327″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
By understanding the Life of an Endpoint, we can:<\/p>\n
With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter.<\/p>\n
Join this discussion as Lee shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7469″ img_size=”” css=””][vc_single_image image=”7468″ img_size=”” css=””][vc_btn title=”13:20 – 13:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
This event is designed for industry leaders, security professionals, and anyone passionate about strengthening their organization’s cyber resilience. Don\u2019t miss this opportunity to learn from experts and network with peers dedicated to driving a people-centric approach to cyber security. Secure your spot and be part of the conversation that shapes the future of cyber security.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_btn title=”13:20 – 13:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
Identity and Access Management (IAM) is crucial in today\u2019s digital landscape, empowering organizations to control user access, safeguard data, and drive efficiency. A solid IAM strategy is not just an option\u2014it\u2019s a strategic imperative for cybersecurity leaders. Join Emil as he reveals Schibsted\u2019s IAM journey, sharing critical insights and strategic decisions that shaped their success. Discover how Schibsted transitioned from complex, custom-built RBAC tools to streamlined, self-service IAM solutions, and understand the thought process and impactful results behind these changes. Gain actionable insights to refine your IAM approach.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7504″ img_size=”” css=””][vc_btn title=”13:50 – 14:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n