News and updates

NIL at RISK 2020: Postavitev rešitev VMware z uporabo arhitekture Zero Trust

Kako vzpostaviti moderno in dinamično varnostno arhitekturo, na podlagi tesnega zaupanja med gradniki Presentation abstract: Koncept Zero Trust Architecture (ZTA) v moderna IT-okolja vpeljuje neprekinjeno overjanje in avtorizacijo dostopa do lokalnih omrežij, podatkov ter poslovnih procesov – s ciljem dodeljevanja natančno definiranega nivoja dostopa ter ohranjanja varnosti v razpršenih poslovnih okoljih.V svojem predavanju bo Stojan

Read More »

SRC at RISK 2020: What is at the center of your SOC

Presentation abstract: We will show how we use Arcsight solutions in the SRC SOC. We will present use cases that we cover using the Arcsight ESM solution and its main advantages. About the presenter: Simon has been working with security for the better part of the last 15 years. He has attained a lot of

Read More »

Sfera IT at RISK 2020: Kibernetska varnost ni samo tehnologija ali kako predstavimo kibernetsko varnost upravi

Presentation abstract: Država in EU podjetjem nalagata vse več zahtev v predpisih s področja informacijskih tehnologij, s katerimi zagotavljanje skladnosti povzroča naraščajoče stroške. Ko k temu prištejemo še stroške za zagotavljanje kibernetske varnosti, se poslovodstvo kmalu sooči s problemom učinkovitosti vseh teh »nepotrebnih« vlaganj. Ali lahko zagotavljanje kibernetske varnosti predstavlja sinergijo naporov in s tem

Read More »

FireEye at RISK 2020: Are you able to validate you security stack?

REMOVE ASSUMPTIONS. PROVE SECURITY. Presentation abstract: Organizations spend massive amounts of time and money to protect themselves from cyber attacks. Security leaders know this pain: a lot of effort exhausted with little to no visibility into security effectiveness. With cyber programs becoming more complex and expensive to operate, CISOs and practitioners need hard evidence that

Read More »

Titus at RISK 2020: Machine Learning: Data Protection’s Next Frontier

Is machine learning the approach that you should take for your data protection strategy? Presentation abstract: Machine learning and artificial intelligence are terms that many IT security professionals are bombarded with when it comes to identifying and protecting their sensitive data. But not everyone understands the differences and what they can mean for their data.

Read More »

ThreatQuotient at RISK 2020: Cyber Threat Intelligence – Top Gun Style

Presentation abstract: When Tom Cruise’s “Maverick” inverted his F-14 fighter jet and gave “the bird” to his Soviet opponent in the opening scene of 1986’s Top Gun, Cruise assured himself a lighthearted place in the history of the Cold War. What that scene also did, however, was provide one of cinematography’s great examples of a

Read More »
Shopping Cart