P
r
o
V
i
s
i
o
n

Contact us

itsecurity@provision.ro

9A Bilciuresti Street, Bucharest

+4 021 321 1568

Categories: In-depth Conference Talks

Lookout

Modernize IT Security for a Secure Environment for your Hybrid Workforce

By Max Sulaiman, Enterprise Account Manager – DACH at Lookout, and Jasin Mehovic, Senior Channel Account Manager DACH & Eastern Europe at Lookout

As apps and data move to the cloud to support hybrid work models, IT is struggling to protect data and provide a secure, productive work environment. By simplifying your IT security you can secure your workforce and devices, provide secure access to private apps, and protect your data across SaaS & cloud apps deployed in a multi-cloud environment.

In this session, Lookout’s security experts will break down how to secure data across all apps and endpoints, and future-proof your organization’s security strategy.w

Digital Sovereignty Solution / Keep Your Data under Your Control

by Petr Kunstat – Pre-Sales Consultant CEE

When we process data, for example information about our customers, we must always keep in mind that the data must not be accessible to anyone unauthorised. After all, this is clearly defined in the regulation known as GDPR. A suitable technique to ensure data protection is to deploy a system to control access rights to data or applications and to deploy a system to encrypt data.

In case of using cloud services, digital data sovereignty needs to be maintained at the same time. The case known as Schrems II showed us how important data sovereignty is. Even giants such as Facebook or Google have to process data in compliance with the principle of data sovereignty. So if we have user authentication and encryption keys under our own control, we do not have to worry about the encrypted data or the encryption key being accessed by a cloud service provider or a government agent or investigator.

What Open XDR Delivers To Empower Security Teams

Miri Varbitzky

by Miri Varbitzky – VP Sales Central & South EMEA at Stellar Cyber

What Open XDR Delivers To Empower Security Teams

The cybersecurity market continues to evolve as new attack tactics challenge best practices. This talk will discuss a new idea called Open XDR (eXtended Detection and Response) , what it means, the different ways to implement XDR, and why you should look into the idea to empower your security team.

The Transition from Fat to Lean Cyber Security

Emir Arslanagic

by Emir Arslanagic – Regional Account & Channel Head for SEE and Turkey at Qualys

Eye-opening presentation on Cyber Security & Compliance System followed by a hands-on demo of Qualys Platform. After the presentation audience should have a better understanding of how and why organizations are shifting their approach from reactive to proactive security. Why do visionary leaders have to empower IT and Security to act faster on potential threats? How the new risk-based approach saves a significant amount of time while enabling the corporate lean teams to focus on other value-added activities.

The latest FTK Digital Forensic innovations

Tomasz Rot

by Tomasz Rot – Director of Sales Central & Eastern Europe at Exterro

An overview into the latest offerings of the FTK Product Suite and how they can assist you in your investigations.

In this session, Tomasz Rot, VP International Channels & Partnerships at Exterro, will provide you with an overview into the current offerings of the FTK Product Suite and how they can assist you in your investigations. You will also hear from the very latest FTK 7.8. product release. Within this release, substantial updates were made, setting the focus on speed. With FTK 7.8. you will get evidence into the hands of investigators in record time, process mobile phone evidence up to 20 times faster, create workflow automations in just seconds, securely investigate your remote workforce and Scale up for massive cases, heavy case volumes & large organizational footprints.

Evolving Threats, how not to be blind and use your limited resources correctly

Petr Hnevkovsky

 by Petr Hnevkovsky – CISM, CISA, CISSP, CEH, Chief Cyber Security Strategist – Micro Focus

Researching security threats to your organisation is employing more and more experts and costs a lot of money. Many companies don’t know where to start, while at the same time they need to focus on their business and its digital transformation. Let’s use threat research effectively in a variety of situations, from security planning, to prioritizing activities, to threat hunting and response automation. All for free with the “Guardians of the Galaxy”.

Evolving Sec Ops for Business Resilience

by Mo Cashman – Trellix Enterprise Architect

Building resilience in your digital enterprise requires a capability to quickly identify a threat and adapt your security posture. Today’s digital enterprise has a wide attack surface, and threats can enter through end-user devices, cloud services or from vulnerable applications, hosted in cloud service providers. It’s important to have visibility across these attack vectors and empower security operations with analytics, threat intelligence and automation to protect the business. Join this session to learn how XDR can help you evolve your Sec Ops capability.

12