Program Catalog
Browse sessions and workshops using the filtering options below.
Archived Virtual Summit available until 17 December 2024.
Browse sessions and workshops using the filtering options below.
Welcome from our ISACA Host!
The network perimeter can no longer protect you. Critical data is proliferating outside of organizational visibility and control at an accelerating rate — aided by important technological innovations from cloud transformation and the SaaS revolution to the explosion of emerging technologies like AI. Protecting data in this increasingly interconnected world requires new collaborative strategies and a renewed emphasis on key controls such as third-party risk management, data governance, data security, access control, and continuous monitoring. Discover the connected risk strategies enabling cyber leaders to partner with internal and external partners to succeed against this important emerging risk.
Learning Objectives:
It's not getting any easier. Every time we turn around there seems to be another attack or threat that demands our attention. While each event is unique, they all result in third-party risk management teams scrambling to ensure their organizations are protected. Rapid responses and emergency assessments can be knee-jerk, stressful and distracting. It doesn't have to be that way.
Join us for a discussion on the best practices to responding to zero-day vulnerability attacks and conducting emergency assessments. We'll outline what's required to prepare in advance so you're ready to execute when the time comes. From establishing solid communication channels to leveraging automation, we'll cover the necessary steps and considerations for an effective response plan.
Session attendees will learn:
Microsoft’s native and add-on email security capabilities help to protect basic email-based threats, but they aren’t enough to ensure full protection. Join our 60-minute session and learn why an effective defense against modern threats like business email compromise, advanced phishing, social engineering attacks, impersonation abuse, and accidental data loss require a people-centric security approach to fortify Microsoft 365 email defenses.
In this session, security experts will discuss: