Akridge | Washington DC
This was our 1st Innovation Lunch dedicated solely to IT Defense Innovation. Typically event registration is limited to CIOs and title-equivalent IT leaders; however, CIO Innovation Forum event host, Bill Murphy, recognizes how important and relevant Defense topics are for our CIOs and their Lieutenants. For this lunch, the team opened up registration to the Lieutenants as well, resulting in record-breaking registration numbers.
Agenda: Cloud and Email Kill Chain Techniques for Modern Multi-Cloud Architectures
- How to Build a Security Platform – vs Best of Breed Approach
- Advanced Threat Protection – Review the importance of multi-engine sandboxing techniques to block unknown and zero-day threats until verdict.
- Single Pane of Glass Threat Detection – SOCaaS – Security Operations Center as a Service – and SEIMaaS – SEIM as a Service, reporting and analytics – all from a single pane of glass
- Security in Office 365: What are the steps like 3rd party email bridge gateways and other items needed to secure Exchange Online, SharePoint Online, OneDrive for Business and Teams?
- Identity Based Access Control: Understand Microsoft’s MFA/2FA and Conditional Access.
- Next Gen CASB with Cloud App Security – Provide next-gen security for SaaS applications such as Office 365, G Suite, Box, Dropbox, etc. by protecting email, data and user identities from advanced threats.
- Secure Mobile and Remote Access – in a Hybrid and Multi-Cloud environment unified secure access gateway that enables organizations to provide access to any application, at any time, from anywhere and on any device.
- Next Gen Endpoint protection: AV is dead. Review advanced behavior based endpoint protection and system rollback options.
- Perimeter Gateway Protection: Virtual FW, Network FW, Wireless, Web Application Firewall – Review comprehensive security in AWS, Azure, Hosted, and On-Prem world.
- RedZone Virtual Information Security Operations (VISO) Programs– Co-managed IT Security solutions for CIOs and Lieutenants who require and need added security capabilities delivered ‘on-demand’ as a ‘virtual’ program.