Financial institutions are expected to address the ever-increasing number of security challenges and stringent security regulations, such as 23 NYCRR 500, while also enabling innovative, differentiated experiences for their customers. As the industry grows more interconnected and complex, maintaining security, governance, compliance, and reducing risk become more challenging amid this growing complexity. The adoption of new technologies such as biometrics, blockchain, machine learning, containers, microservices, serverless, and API innovations present additional challenges. Roundtable delegates will discuss the state of security, risk, and compliance in this new environment and share thoughts on how we can make sure security does not become an afterthought. The discussion will allow attendees to share methodologies to foster an innovation development lifecycle that is secure, reliable, and resilient best practices for real-world security automation and orchestration techniques for today’s complex hybrid environments. Featuring: Moderator: IDG Editor in Chief, Steve Orr, in, Federal CTO, Intel Corp Subra Kumaraswamy, VP Security Infrastructure and engineering, Visa Anthony Golia, Chief Architect, Financial Services Strategy and Solutions, Red Hat

Hora

20:00 - 21:00 hs GMT+1

Organizador

Change the Economics of IT
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 756 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020
Jue 18 de Junio de 2020