Ransomware attacks, breaches, data exfiltration, and insider disclosures are occurring every day around the world. Legacy thinking on providing data security has been focused on the application and platform or operating system. This leads to a somewhat chaotic data security landscape that is likely to have holes and missed handoffs. Modern enterprise systems use and store data using the most effective platform that delivers the convenience and performance required. This open-ended approach to data handling should be addressed through an equally open and flexible approach to securing data regardless of where it is stored or how and when it is used. Businesses should take a holistic view of their data security to ensure that unintended gaps and inconsistencies that may open the door for threat propagation are detected and mitigated. Enacting multiple layers of data management practices ensures that both stored and inflight data is clean. This keynote will draw on the Data Security Maturity Model (DSMM) to illustrate the challenges developers and users face in the open landscape of current application deployments. Placing a strong focus on a layered framework that provides consistent and robust security for data as it is used, this approach incorporates seamless malware scanning and detection that provides a constant watch for irregularities and threats.
As chief technology officer for CSS, Kevin leads the company’s product development, engineering, and customer experience groups in delivering unparalleled cloud storage security solutions that address current and future customer storage security needs. Kevin brings CSS a wealth... Read More →
As cloud native environments become more secure, attackers are shifting their focus to infiltrate the software supply chain. Securing the software supply chain starts at the beginning of the development process and continues throughout the application’s development lifecycle, but the complexity means that it is easy to miss links in this chain.
This session will construct a threat model that includes everything from the developer work stations, the code and open source libraries that make up an application, to the entire pipeline of building and deploying an app and the teams that maintain it.
Attendees of this session will: • Understand the steps needed to manage and ensure the security of a broader software supply chain considering quickly evolving tech innovations. • Learn how to determine the best tools for tracking the software development lifecycle in cloud-native settings. • Discover how new generative AI tools can help automate some of the monotonous tasks such as fixing or updating older or broken code.
Mike Milner is the VP Cloud Technology at Trend Micro. Between fighting cybercrime for the Canadian government and working for security agencies overseas, Mike has developed a deep understanding of the global security landscape and how the underground economy dictates hacks and drives... Read More →