As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. It is indeed against this background that the virtual Cloud & Security Forum 2020 is designed to assist in driving an impartial and informed dialogue in the rapidly evolving information security industry.
Having continued to create an environment for making new connections, the summit with visionary speakers at the nexus of new technologies and cyber security solutions purposes to share their insights and demonstrate their ability to safeguard customer data.
From new applications being consistently added to networks to employees taking access control shortcuts and credentials being compromised, it is clear that there are endless vulnerabilities to detect and manage.
Join the information security industry experts as they discuss strategies, tools and solutions to ensure your organization is secure.
45
-
55
00
-
15
15
-
30
30
-
00
Since the Kenya’s Data Protection Law enactment in November 2019, what has been the immediate next step? To what extent has it raised the bar of obligation, accountability and compliance among the industry players? To what extent are organisations (public or private sector) adhering to strict regulations around privacy, security and consent? What are the data protection procedures and how is it moving on in enterprises? What obvious things have changed to uphold the spirit of the law? What activities reflect how practices within organisations are changing or have changed?
00
-
15
30
-
45
45
-
15
15
-
25
As CIOs role largely hinges on driving revenue and scaling digital business for their organizations, their focus seems to have put a spotlight on chief information security officers (CISOs) hence begging the question: Shouldn’t the CISOs role be evolving just as seemingly dynamic role of CIOs? Who should the CISOs report to? To what extent should organizations shift the view of security and risk from a technical problem to a strategic business priority?
25
-
55
As CIOs role largely hinges on driving revenue and scaling digital business for their organizations, their focus seems to
have put a spotlight on chief information security officers (CISOs) hence begging the question: Shouldn’t the CISOs role
be evolving just as seemingly dynamic role of CIOs? Who should the CISOs report to? To what extent should
organizations shift the view of security and risk from a technical problem to a strategic business priority?
55
-
00
45
-
00
00
-
15
15
-
30
00
-
30
How has the threat landscape changed since the crisis started? What type of threats are on the increase? How have organizations responded? What new response measures have been implemented? What lessons have been learned? To what extent are organizations’ remote working infrastructures and endpoints protected? What risks do companies need to be aware of? How have companies educated their remote workers/implemented awareness campaigns? What lessons about cybersecurity can be learned from the virus itself?
30
-
40
50
-
20
With our modern dependence on technology and security, from what stage should organizations develop a security culture? How effective has security be embedded into everything an organization does? While security awareness appears widespread and possibly mainstreamed, why has security culture not kept up with the pace of threat landscape?
20
-
30
30
-
00
Vendor risk management isn’t just required in highly regulated industries, it's good practice in all industries. But today’s approaches are mired in lengthy and complex assessments that span a variety of threats and risks. This session will discuss how to improve and enhance your model for managing vendor risks. How can we improve the efficiency and value of our vendor risk-management program?
00
-
05
Head of Information Security at ICT Authority
More Information
Associate Director, Cybersecurity, Privacy & Trusted Technology of EY
More Information
This is a ticket for Sellers, resellers or distributors of technology and solutions