P
r
o
V
i
s
i
o
n

Contact us

itsecurity@provision.ro

9A Bilciuresti Street, Bucharest

+4 021 321 1568

Categories: In-depth Conference Talks

Cortex: reimagine the SOC

Tudor-Cristea

by Tudor Cristea –  Regional Sales Manager, Cortex

With an automation-first approach, Cortex radically improves protection while transforming and streamlining today’s manual SecOps model.

Agentless Linux Security

Paul Jespersen

by Paul Jespersen – VP WW Sales at Sandfly Security

Linux is different so why are you using agent based solutions that was probably ported over from a Windows tools to protect your Linux hosts. Don’t settle for lowest common denominator protection for your high value Linux infrastructure.

We’ll discuss the business and technical advantages of a linux first and an agentless approach.

 Encryption protects your data, HSMs protect encryption

Umberto Sansovini

by Umberto Sansovini – Territory Sales Manager at ENTRUST

Cryptographic keys are some of your organization’s most precious assets. The value of any key is equivalent to the value of all the data it protects. If a key is compromised it’s game over! Attackers trying to hack systems can easily find cryptographic keys maintained in software. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence.

When using HSMs to protect these keys, a robust layer of security is added, preventing attackers from finding them. nShield HSMs are specially designed to establish a root of trust, safeguarding and managing cryptographic keys and processes within a certified hardware environment and providing enhanced key generation, signing, and encryption to protect sensitive data and transactions.

Cyber Resilience in a fragile World

Frank-Lange

by Frank Lange – Technical Director at Anomali

Breaches are inevitable, which is why security teams turn to technology to help overcome some of those challenges. Unfortunately, most solutions detect unknown threats by investigating suspicious activity observed in a customer’s environment, which can leave an incomplete picture and not tell the full story. And with an ever-growing attack surface, you can’t just rely on perimeter defenses.

Organizations need a solution that informs all aspects of their security defenses that includes prioritized intelligence requirements based on shared understanding of their relevant threat landscape to determine who their adversaries might be, as well as their attack methodologies. Rather than trying to prevent the inevitable breach, organizations must switch to a continuous-monitoring mindset, where threats are prioritized, and focus is given to mitigating and limiting resulting damage from an attack.

Effective Cyber Resilience starts with relevant global intelligence curated to produce high-fidelity signals used to precisely detect threats and response tools that re-establish an organization’s compromised security posture.

To protect your sensitive data, first you must know where it is…

by Yad Jaura – Ground Labs’ Head of Product Marketing

Data is the lifeblood of a modern enterprise and its effective use is critical to an organization’s wellbeing. However, not all data is the same. Some data is much more sensitive and needs greater protection. Securing data and protecting against the risks of its misuse, can only be done once you know exactly what data you have and where it resides. In this session, we’ll be discussing how data can be discovered across your estate so that risks can be mitigated and compliance requirements met. We’ll do this with the help of some examples and case studies. We’ll also look at immediate steps you can take, to ensure data is used and protected in a way that makes it most effective for your enterprise.

Protecting the World`s Critical Infrastructure

George Chereches

by George Chereches – EMEA Sales Engineer Team Lead, OPSWAT

In this session you can learn about OPSWAT`s holistic approach to OT Security through a unique and innovative combination of technologies and solutions.

Bridge the gaps between your various security silos: Data, Identity, Infrastructure

by Evgenia Izotova – Netwrix Regional Director Eastern Europe

How can you ensure that your organization is more secure tomorrow than it is today? IT environments become more complex. Attacks increase in sophistication. Your teams struggle with disparate tools to manage and secure everything. Your chances of landing in the breach headlines are skyrocketing.

In every organization, there are three major attack surfaces: data, identity and infrastructure. Let’s say there’s a vulnerability at different points on each level. It’s pretty easy for a bad actor to take advantage of these weak spots and make their way through your environment, and ultimately to your data. The problem is most solutions only protect a single layer, creating silos of security. Even if you close one of those security holes with a point product, the gaps still remain in other attack surfaces and between point products.

How is the Netwrix approach different? We look at data, identity and infrastructure holistically to eliminate the blind spots and overcome complexity. For these 3 layers you need to cover all the cybersecurity functions: identify and protect to set your organization on the right course of security. And detect, respond and recover should you have a breach (since we live in a world of assumed breach).

Come to this session to look closer at the cybersecurity solutions that can build a roadmap for a comprehensive IT Security: IT System Hardening → Active Directory Security → Privileged Access Management → Data Access Governance

Introducing Skyhigh Security

BY Vladimir Palacka – CyberSecurity Account Manager, SkyHigh Security

From our earliest beginnings more than a decade ago, we focused on protecting data. As McAfee Enterprise, we continued to innovate, and now we are proud to launch as Skyhigh Security.

We created Skyhigh Security because in this cloud-first world, people are still using the same old approach to protecting their data. Even though the cloud’s promise is to relieve the burden on IT, security solutions have not kept up. You deployed the cloud because it’s easy. Protecting the data should be easy too.

We were among the first to recognize the cloud’s potential and knew that protecting data in this new hybrid world required an entirely new approach. We make managing your web and unifying your data policies easy to create and enforce, giving you a single console to provide visibility across all of your infrastructure.

We go beyond data access and focus on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing their security.

Come check it out for yourself and see why we’re a recognized leader.

Using Block-chain principles for Defensive and offensive Application Protection

Eran Danino

By Eran Danino – Regional Sales Manager at Radware CEE

New innovative Block-chain principles are utilized to provide superior Application Protection by using methods of Crypto identity to track and score accounts that access publicly exposed Web and API applications.

The unique approach utilizes basic block-chain concepts such as Smart contracts, Token exchanges and Proof-of-Work (PoW) to establish a trust score per account, by that leverage various behavioral algorithms to detect and apply both defensive methods as well as offensive/punishment methods on abnormal account behavior.

Forcepoint ONE – Security Simplified

by Igor Urban- Territory Account Manager at Forcepoint

Latest events in the world brought the topic of Cyber security to the podium, but the primary challenges stayed the same. How to do an effective cyber security with limited number of cyber security specialists in hybrid environment of today.

12