16 November 201612:00 PM - 5:00 PM
The Clubhouse, 8 St James's Square, London, SW1Y 4JU
Governance, Risk management and Compliance (GRC) is an important part of a business’s risk management approach, and encompasses every aspect of the organisation’s infrastructure.
GRC goes beyond just security; it is about visibility, aligning IT processes and procedures to deliver effective policies, and developing a framework that will provide a long-term approach. As businesses move away from a more traditional silo approach towards an integrated approach that brings together and manages IT operations and departments across the company.
ZONE SE7EN will investigate why GRC is becoming such an important issue for businesses, how to engage the workforce and get their buy-in, understanding how governance and regulation work together, and understand why IT has moved forward and is now more technically advanced.
• Learning how behaviours and relationships come under the governance umbrella.
• Developing codes of corporate governance and ethical policies.
• Taking an intuitive approach to developing applications and systems.
• The impact of changes in regulatory requirements on the IT processes.
• Ensuring documentation is tested for its relevance and kept up-to-date.
• Prevention and detection of insider threats
• Recovery from a targeted cyberattack
• Governance, risk and compliance (GRC)
• Optimizing security information and event management and threat intelligence tools
• Emerging Security Technologies & Trends
• Defining a Risk Strategy
• Practices and technologies for cloud, mobile, data, application endpoint and network security
• Are next generation firewalls (NGFW) enough?
• Why rapid detection and response to cyber threats is a must.
• Shared Threat Intelligence
Security & Risk Leaders: CIOs, CISOs, CSO, CROs, CTOs, Security Architects, Infosecurity Leaders, Network Security Managers, IT Risk Managers, IT GRC Managers, Cyber Security Managers, Heads of IT Security, Heads of Security, Heads of User Access, Heads of Risk, IS Security Managers – Architects: Enterprise Architects, Technical Architects, Solution Architects, Application Architects, Infrastructure Architects, Identity Architects – IT Leaders: Application Managers, I&O Leader, UX Managers, IT Service Managers, System Analysts – IAM Leaders: IAM Program Leads, IAM Architects, IAM Planners, IAM Consultants, Access Managers, Access Control Analysts, Heads of Identity, Identity & Information Assurance
Interested in attending a ZONE SE7EN event?
Our events offer the delegates and attendees the perfect opportunity of being involved in a truly networked, collaborative approach, delivering informed, dynamic answers to evolve your decision-making.
Register your interest to attend, and a member of our team will be in touch with you shortly.
Sponsorship positions are limited to just four sponsors per event. If you are interested in having the opportunity to discuss your Governance, Risk, Compliance (GRC) and/or Threat Intelligence solution with key industry influencers and decision makers, a sponsorship opportunity may be right for you. Please visit our sponsorship page here for more information.
Event sponsors TBC.
Rashmi Knowels CISSP, Chief Security Architect, RSA
Rashmi is Chief Security Architect at RSA, The Security Division of EMC. She works to promote the adoption of RSA’s core technology with customers and partners and drives thought leadership initiatives in EMEA. Her current responsibilities include working with customers in a trusted advisor role to help realise the business benefits of comprehensive data security and is a prominent evangelist and spokesperson for both professional and industry conferences. She is a frequent blogger on ThoughtFeast.co.uk and has appeared on the BBC both Television and Radio as a subject matter expert for Advanced Cyber Threat. Rashmi has over twenty five year’s experience in data communications, mobile communications and has focussed on Information Security for the last fifteen years.
Rashmi tells us what makes an intelligence driven security strategy intelligent, the three key elements being visibility, analysis and actionable intelligence, and she explains how organisations need to spend more on response and monitoring rather than just prevention.
We also find out more about the benefits of an intelligence driven security strategy, how it can help reduce the number of cyber attacks, help retain valuable security staff, and we discover the consequences of not adopting this strategy.