IT security is an ongoing challenge that brings new threats alongside new solutions every year. Given the current cybersecurity climate, it’s not surprising security conferences continue to attract growing numbers of CIOs, CxOs, IT managers, and security staff.
Hundreds of Canadian IT security practitioners are set to attend SecTor 2018, scheduled to run at the Metro Toronto Convention Centre from October 2–3, with an optional pre-conference day on October 1.
Meet the need for more IT security education
Now more than ever, IT managers need to ensure their team members are armed with the latest knowledge in IT security and the very best endpoint security strategy. Cybersecurity Ventures predicts a business will fall victim to a ransomware attack every 14 seconds by 2019. Yet, many businesses continue to underestimate the threats to their own organizations. An HP survey of 300 IT and security pros found most were overlooking a significant network security risk.
In today’s environment, you and your security team are likely hungry for all the extra training you can get. Here’s a quick look at some of the most interesting sessions you can find at SecTor 2018 to sharpen those security skills.
IT professionals: It’s not too late to register for SecTor 2018
If you’ve already registered for SecTor 2018, then you already know the conference packs a lot of expert-led sessions into two days. To help you plan your conference calendar, we’ve highlighted five of our most anticipated sessions below.
Not going to the conference? We’re willing to bet that one look at these session highlights will change your mind. (Please note: The SecTor 2018 session schedule may change, so it’s best to check the conference calendar closer to the event date.)
5 sessions you should add to your schedule
- Turning Your Cybersecurity Toddlers Into Warriors. October 2 from 10:15am to 11:15am. It’s not easy to stay ahead of the bad guys, but that’s what organizations today must do to keep their data secure. Shira Shamban highlights the most common mistakes in IT security operations and outlines the steps IT managers and departments need to take to build a company of cybersecurity warriors. Shamban worked for 13 years as an officer in the elite intelligence unit of the Israel Defence Force, so it’s safe to say she knows a thing or two about warriors.
- Developing and Implementing an Effective Endpoint Security Strategy. October 2 from 11:30am to 12pm. No security strategy is complete without a robust endpoint security strategy. Kurtis Armour, principal security specialist at Scalar Decisions, explains why an in-depth endpoint security strategy is critical. Given that code execution on servers and workstations is one key way to breach security in organizations, businesses need to develop the ability to respond quickly. In this session, Armour demonstrates ways to protect against malicious code within a corporate environment.
- Case Studies in Defending Your Digital Enterprise. October 2 from 1:25pm to 1:55pm. It’s great to learn about best practices in IT security, and even greater to hear how these best practices are applied in real-world situations. In this session, Matt Broda, technical fellow in security at Bell, presents case studies illustrating the breaches experienced by real organizations and examines the various strategies you can use to defend against those types of cyber attacks.
- Pragmatic Cloud Security: The Future Is Now. October 3 from 10:15am to 11:15am. What’s not on the cloud these days? Mike Rothman, president of DisruptOPS and Securosis, expands on this “new frontier” and the security vulnerabilities inherent in new cloud architectures, higher velocity processes, and sharper business-level metrics. That’s the bad news. The good news, as you’ll soon learn from Rothman, is that the cloud’s wholly automated and API-enabled attributes present security teams with big opportunities to build and embed security into their cloud technology stack.
- Why Can’t We Build Secure Software? October 3 from 2:40pm to 3:40pm. Tanya Janca, senior cloud advocate for Microsoft and open source developer, sheds light on the root causes behind low-quality, low-security software, including short deadlines, fragile egos, and pressure from management and IT security teams that may not fully understand what goes into building secure software. In addition to highlighting the causes and effects of insecurities and other behavioural influencers, Janca presents solutions you can apply immediately to your workplace.
These are just a few of the insightful sessions coming up at SecTor 2018. While you’re thinking about conferences, you may as well consider these other fall technology summits, too. See you at the conference!