Specialist workshops at ISW 2019 


Our four specialist afternoon workshops tracks are an opportunity for focused learning and discussion. Hear from NTT experts and our partner organizations.

The workshop schedule below is updated regularly, so please check back for more information.

Track 1 – Intelligent Business: Accelerate business transformation in the industrial world

Led by Tim Ennis / Christian Koch, NTT Security

Synopsis:

Rapid advancement of digital technology in the industrial world offers many benefits, from increased productivity to reduced capital and operational expenditure.  But as organizations become increasingly reliant on technology both old and new, they must balance these benefits with the potential risks – the challenges of evolving regulations and stakeholder expectations for security.
Using case studies and best practice examples from across industrial sectors, this session will explore how asset owners from both IT and OT perspectives can work together to improve their security posture and support the journey to Society 5.0.

Join this session to learn:

  • The latest approaches to identifying, assessing and managing cybersecurity risk within industrial environments
    How to reduce risk in legacy networks, and incorporate relevant threat intelligence
  • Ways to visualise your industrial networks to improve resilience, respond to incidents and establish continuous compliance with evolving international regulations
  • The benefits of deploying security orchestration, automation and response (SOAR) to maximize the productivity of your valuable security resources with efficient threat qualification, investigation, and automated playbooks for remediation

With sessions from our sponsors: 

partnerlogo_fortinet
partnerlogo_Nozomi

DE_white_box

Track 2 – Intelligent Infrastructure: Secure by design

Led by: Rory Duncan, Charles Read, Gary Dawkin and Darren Chapple, NTT

Synopsis:

Our research shows that investment in cyber security is currently flat.  More than ever, security professionals are asking how they can make their infrastructure secure by design to maintain resilience and adapt to the changing needs of their business. The agility and cost benefits of distributed platforms and cloud services can result in additional, unplanned outlays, introduce risks to business continuity and make it a challenge to apply security controls consistently to ensure compliance. This session is designed for those working to safeguard the applications and workloads on which your business processes depend.  Join this track to discuss how to securely unify existing infrastructure and multi-cloud environments so that you can deliver transformation faster and make better decisions based on enhanced visibility, reporting and analysis.

Join this session to learn:

  • Reduce operational costs and improve resource usage for multi-site deployments by deploying software-defined capabilities whilst safeguarding security and data privacy
  • Secure access to your digital infrastructure and provide protection for all privileged credentials – whether they are human or machine, on premise, in the cloud or in hybrid environments
  • Deploy security orchestration, automation, and response (SOAR) to maximize the productivity of your valuable security resources with efficient threat qualification, investigation, and automated playbooks for remediation

With sessions from our sponsors: 

partnerlogo_f5

DE_white_box

Track 3 – Intelligent Workplace: Empowering workforce through connectivity, data privacy and security

Led by: Shakeel Ahmad, Matt Schofield, Frank Balow, NTT Security

Synopsis:

In a fast-paced and constantly evolving digital landscape, organizations want engaged employees who can collaborate and communicate effectively. The physical boundaries of the workplace have eroded to their lowest level, with lines blurring even further between employees’ work and personal lives. Working on the go or from home or satellite offices, with the option to bring your own device, working from client spaces, more frequent job changes and the expectation to be always connected - are not only challenging the conventional thinking around the identity perimeter, but also pushing it to its limit.

Designed for CISOs and Security Architects seeking to embed the latest thinking on issues of identity into current and future programmes, this session will explore how to simplify the way you control access to every application, file folder and cloud platform across your hybrid IT environment by associating identity to each individual stakeholder.

Join this session to learn:

  • Smarter identity – Use the power of AI and machine learning to identify risky users, get predictive recommendations on who to allow access, and identify where you can deploy automation for low-risk manual and repetitive identity activities 
  • Scale trusted digital services – How manage the risk of identity theft and unencrypted data for billions of connected individuals and things Thales
  • Zero Trust identity – how visibility of your workforce gives you the power of zero trust for managing access to data, applications, systems and devices

With sessions from our sponsors: 

Sailpoint

DE_white_box

Track 4 – Intelligent Cybersecurity: Maximizing the power of knowledge and skills

Led by: Azeem Aleem, David Gray, NTT Security (Supported by Mike Pimlott and Charles Bovy)

Synopsis:

Threat actors and cyber criminals have traditionally had the advantage when attacking organizations. They only have to be right once, whereas companies, even when challenged by extreme skills shortages, have to be on the top of their game at all times. But the balance of power may be set to change. Developments in the application of machine learning, automation and proactive intelligence are transforming the focus, prioritization and effectiveness of cybersecurity teams.  Designed for any security specialist working at the sharp end, this session will explore the latest ways to predict, detect and respond to threats by building the most efficient threat intelligence, resource and skills model for your organization.

Join this session to learn:

  • Knowledge is power – hear practical examples of how threat intelligence can be used not only to block attacks, but also to build a proactive incident response plan
  • Automation dividend – building response procedures (Runbooks) ensures a consistent approach for security staff, but also creates an opportunity to automate critical steps in the triage process. When implemented with appropriate checks and balances, automatic blocking of threats can increase efficiency and reduce business impact
  • Connected everything – endpoints of all types are now the front line for threat detection and response in any organization. How can security teams respond in a ‘smart’ way to identify, block and remove threats to their network without compromising the speed of business?

With sessions from our sponsors: 

partnerlogo_crowdstrike
partnerlogo_crowdstrike

DE_white_box

DE_white_box