Webinar How to Re-establish Your Network and Security Perimeter, and Accomplish a Zero Trust Framework
By Insight UK / 8 Jul 2020 / Topics: Cybersecurity
By Insight UK / 8 Jul 2020 / Topics: Cybersecurity
Discussion Panel Webinar
Very few organisations were fully prepared for a sudden move to an almost entirely remote working profile. Following the immediate need to facilitate the associated IT migration demands, business continuity plans and future-proofing needs, organisations are now focused on making the right investments. And IT teams now need to prioritise scalability, flexibility, availability, integrity and security.
Organisations unable to maintain their traditional perimeters are now seeking viable solutions to address this challenge. Additionally, they need to find a balance between the adoption of modern digital workplaces and the retention of a central security incident and event visibility, analytics and remediation function.
With the introduction of new attack surfaces, many opportunities have already arisen for threat actors to target organisations. In addition to using traditional ransomware and phishing attacks, hackers have started to use increasingly complex and innovative methods, making them harder to identify and manage.
This webinar will be of value to anyone with a Security remit across all IT functions from implementation specialists through to senior strategic decision makers. Join our panel of leading risk, cyber and information security and compliance experts as we discuss:
Cyber Security Practice Lead, Insight
As a certified information security manager holding ISACA CISM and CRISC certifications Charlotte has worked with an extensive portfolio of FTSE 100 organisations as well as UK Government and Defence clients for over a decade to deliver trusted Managed IT and Cyber Security Services, Solutions, Technologies and Consultancy.
Providing a consultative approach to Insight’s customers our Cyber Security Service Practice provides best of breed Managed Security Services, IT programs, which are Secure by Design and only the most comprehensive Cyber Security defences to drive organisation-wide efficiencies as well as provide reliable brand, IP and business assurance.
Chief Risk, Privacy and Information Security Officer, AvePoint
Dana is responsible for AvePoint’s privacy, data protection, and security programs. She manages a global team of subject matter experts that provide executive level consulting, research, and analytical support on current and upcoming industry trends, technology, standards, best practices, concepts, and solutions for risk management and compliance. Ms. Simberkoff is responsible for maintaining relationships with executive management and multiple constituencies both internal and external to the corporation, providing guidance on product direction, technology enhancements, customer challenges, and market opportunities. Ms. Simberkoff has led speaking sessions at data privacy and security events around the globe. She was featured in Forbes, writes a monthly column for CMSWire, and was highlighted in the CSO Online list of “12 Amazing Women in Security”. She is a current member of the Women Leading Privacy Advisory Board and a past member of the Education Advisory Board for the International Association of Privacy Professionals (IAPP). Ms. Simberkoff holds a BA from Dartmouth College and a JD from Suffolk University Law School.
President, Centre for Information Policy Leadership at Hunton & Williams LLP
Bojana brings more than 20 years of experience and deep knowledge of global data privacy and cybersecurity law, compliance and policy. She has a proven industry record in designing strategy, and building and managing data privacy compliance programs. Bojana works with corporate leaders on developing effective accountability-based governance programs and addressing other information policy challenges for organisations in managing and protecting personal data in today's information age. The Centre for Information Policy Leadership works with corporate members on projects including big data and analytics, cybersecurity, implementing accountability and compliance programs, cross-border data transfers, interoperability of conflicting national legal requirements, changing role of corporate data privacy officers and government use of private-sector data.
In partnership with