What can you do to be a more trusted vendor? That’s the question this session seeks to answer. Besides answering security questionnaires, what other ways can you demonstrate that you are a trusted vendor? Could you reduce the length and amount of questionnaires you receive by aggregating enough security, privacy, compliance, and reliability details into a single “profile” to deliver to inquiring customers? As is often the case, undergoing a security evaluation can take a significant amount of time, slowing your sales teams down and delaying a customer’s ability to work with you. Security questionnaires (and the work that goes into answering them) are often the biggest time-consuming components of evaluations. Eliminating security questionnaires altogether is highly unlikely, but by taking a proactive approach to security evaluations, you can build trust through transparency, showing your customers that you take their most pressing concerns seriously. So, what 10 things do your customers want to know about your trust program? 

  • Why “trust” is becoming a competitive advantage
  • How gaining trust with customers upfront can help speed up sales cycles
  • What security, privacy, and compliance documentation customers want to see
  • How organizations reduce the amount of custom questionnaires they receive

Dan Harms

Consulting Manager

OneTrust GRC

This session is now on-demand

  • How and why ransomware attacks continue to spike.
  • To pay or not to pay? - and why answers to this age old question may have changed.
  • What to do with files that remain locked even after ransom is paid?
  • The role of cryptocurrency – and will its importance continue?

Moderator:

Nik Whitfield

Chairman and Chief Sser

Panaseer

Darrell Bateman

CISO

City Bank Texas

Raj Badhwar

SVP & CISO

Voya Financial

 

David Levine

VP Corporate & Information Security, CSO

Ricoh

Jenny Menna

VP, Business Cybersecurity Risk

Humana

This session is now on-demand

It’s like dating… and both sides can better communicate to be more successful

  • My unique experience on this topic
  • Getting customers to “swipe right”
    o Vendor Email, LinkedIn, and phone etiquette
    o Examples of good and bad approaches
  • The “first date”
    o Meeting tips for vendors, virtual and in person
  • After the date: getting them to text you back

Rick Doten

VP, Information Security, Centene &

CISO, Carolina Complete Health

This session is now on-demand

APIs are fueling faster innovation as the backbone of today’s modern apps. Unfortunately, they’re also a massive target for bad actors, who have realized APIs are both the superhighway to a company’s most valuable data and services and woefully under-protected. We’ve seen headline after headline about companies with API vulnerabilities or leaky APIs leading to massive data exfiltration, account takeover, and other abuses. Yesterday’s security stack simply can’t stop today’s API-focused attacks.

Attend this session to hear about:
•    The way attacks have changed
•    Why every API vulnerability is necessarily a zero-day vulnerability
•    The reasons today’s security tooling falls short
•    How to protect yourself against bad actors targeting APIs
 

Roey Eliyahu

Co-Founder & CEO

Salt Security

Curtis Simpson

CISO

Armis

This session is now on-demand

As we all know, an individual CISO or security team is not enough to keep your system safe – hear how our panel of experts have made certain that security is a priority for all. 
•    The continued importance of training and testing your staff. 
•    Finding and utilizing security champions throughout the company. 
•    Addressing insider threat – often dubbed security’s main pain point.
•    How remote work has impacted processes

Patrick Benoit

VP, Global Cyber Governance Risk & Compliance/BISO

CBRE

Colleen Pratts

Director of Cybersecurity, Governance and Services

Quanex Building Products Corporation

Peter Rosario

CISO

USI Insurance Services

David Sheildlower

VP & Chief Information & Privacy Officer

Turner Construction Company

This session is now on-demand

Hear the panel’s take on their experiences and experiments in integrating Zero Trust.
•    The role of MFA, IAM and endpoint security in a hybrid world.
•    How to continuously monitor and validate access without losing productivity.
•    Other relevant frameworks and which is best for your organization?

Quincey Collins

CSO

Sheppard Mullin Richter & Hampton LLP

Gary Gooden

CTSO

Seattle Children's

Seema Sewell

Assistant CISO

Maricopa County

George Viegas

CISO

Chapman University

This session is now on-demand