Register for the webinar
Many organizations are struggling to keep up with an onslaught of significant regulations like GDPR, CCPA, the New York Shield Act and more. Some of this legislation appears to overlap, while some seems to be contradictory. How can organizations sort out this tangled regulatory web?
Submit your questions for a discussion with risk and compliance expert Dov Goldman, who will cover compliance best practices and how your organization can keep up with 2020’s extensive regulatory requirements.
Does customer data leave the vendor’s production systems under any circumstances?
Does the vendor support single sign-on?
Does the vendor have an employee security awareness program?
In this webinar, you will:
If your organization must comply with regulations, this is a webinar you can’t afford to miss!
1
2
3
Demi is an expert at building communities and networks, both online and offline. His technical background enables him to provide visibility into companies’ seemingly blind spots and build large systems to empower users through insight-sharing. Demi is a recognized Google Developers Expert, co-founder of “Big Things” — one of the largest big data communities — and of the local Google Developer Group Cloud. He is a renowned international speaker, presenting big data solutions and distributed and scalable systems to both technical and management teams.
!
If your organization is looking to improve its third-party security program, this is a webinar you can’t afford to miss!
Can’t make it? Register anyway. We will send you the recording.
If your organization is looking to improve its third-party security program, this is a webinar you can’t afford to miss!
Can’t make it? Register anyway. We will send you the recording.
About the Speakers:
The SolarWinds Breach:
Hitting the Kill-Switch During a
Supply Chain Attack
Tuesday, January 19
9 am PT | 12 pm ET | 5 pm UK
We can all agree that trying to predict a massive security breach like what happened with the IT management company SolarWinds, one of the most significant supply chain attacks in recent history, is impossible.
However, we need to have a game plan for WSHTF. Doing so helps us better understand the steps to take, conduct proper risk management and remediation, and prepare a “kill-switch” to isolate the problem.
How can this be achieved?
In this webinar, we’ll discuss how to:
Demi Ben-Ari
CTO and Co-Founder, Panorays
We’ll share our experiences with numerous security practitioners implementing their own mitigation strategies, as well as address sophisticated cases like the SolarWinds breach.
Nathan is passionate about bringing new technologies to market to solve real problems. Prior to his position at Axionus, he held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree and CloudLock (acquired by Cisco). He is a frequent speaker and contributing author on topics related to the intersection of collaboration and security.
Nathan Burke
Chief Marketing Officer, Axonius
Dan Trauner
Director of Security, Axonius
Daniel Trauner leads the implementation of security and IT practices for a distributed and rapidly growing team at Axionus. Previously, he was the director of platform security at Bugcrowd, where he worked with thousands of security researchers worldwide who collectively attempted to understand, break and fix anything that companies would let them.
The SolarWinds Breach:
Hitting the Kill-Switch During a
Supply Chain Attack
We can all agree that trying to predict a massive security breach like what happened with the IT management company SolarWinds, one of the most significant supply chain attacks in recent history, is impossible.
However, we need to have a game plan for WSHTF. Doing so helps us better understand the steps to take, conduct proper risk management and remediation, and prepare a “kill-switch” to isolate the problem.
How can this be achieved?
Tuesday, January 19
12 pm ET | 5 pm UK
Gain visibility of your company assets
Achieve control of your environment
Be informed about your infrastructure
Understand your supply chain landscape
In this webinar, we’ll discuss how to: