What can you do to be a more trusted vendor? That’s the question this session seeks to answer. Besides answering security questionnaires, what other ways can you demonstrate that you are a trusted vendor? Could you reduce the length and amount of questionnaires you receive by aggregating enough security, privacy, compliance, and reliability details into a single “profile” to deliver to inquiring customers? As is often the case, undergoing a security evaluation can take a significant amount of time, slowing your sales teams down and delaying a customer’s ability to work with you. Security questionnaires (and the work that goes into answering them) are often the biggest time-consuming components of evaluations. Eliminating security questionnaires altogether is highly unlikely, but by taking a proactive approach to security evaluations, you can build trust through transparency, showing your customers that you take their most pressing concerns seriously. So, what 10 things do your customers want to know about your trust program?
- Why “trust” is becoming a competitive advantage
- How gaining trust with customers upfront can help speed up sales cycles
- What security, privacy, and compliance documentation customers want to see
- How organizations reduce the amount of custom questionnaires they receive
- How and why ransomware attacks continue to spike.
- To pay or not to pay? - and why answers to this age old question may have changed.
- What to do with files that remain locked even after ransom is paid?
- The role of cryptocurrency – and will its importance continue?
Moderator:
This session is now on-demand
It’s like dating… and both sides can better communicate to be more successful
- My unique experience on this topic
- Getting customers to “swipe right”
o Vendor Email, LinkedIn, and phone etiquette
o Examples of good and bad approaches - The “first date”
o Meeting tips for vendors, virtual and in person - After the date: getting them to text you back
Rick Doten
VP, Information Security, Centene &
CISO, Carolina Complete Health
This session is now on-demand
APIs are fueling faster innovation as the backbone of today’s modern apps. Unfortunately, they’re also a massive target for bad actors, who have realized APIs are both the superhighway to a company’s most valuable data and services and woefully under-protected. We’ve seen headline after headline about companies with API vulnerabilities or leaky APIs leading to massive data exfiltration, account takeover, and other abuses. Yesterday’s security stack simply can’t stop today’s API-focused attacks.
Attend this session to hear about:
• The way attacks have changed
• Why every API vulnerability is necessarily a zero-day vulnerability
• The reasons today’s security tooling falls short
• How to protect yourself against bad actors targeting APIs
This session is now on-demand
As we all know, an individual CISO or security team is not enough to keep your system safe – hear how our panel of experts have made certain that security is a priority for all.
• The continued importance of training and testing your staff.
• Finding and utilizing security champions throughout the company.
• Addressing insider threat – often dubbed security’s main pain point.
• How remote work has impacted processes
Colleen Pratts
Director of Cybersecurity, Governance and Services
Quanex Building Products Corporation
This session is now on-demand
Hear the panel’s take on their experiences and experiments in integrating Zero Trust.
• The role of MFA, IAM and endpoint security in a hybrid world.
• How to continuously monitor and validate access without losing productivity.
• Other relevant frameworks and which is best for your organization?
This session is now on-demand