ISC2 Spotlight: Modernizing Security Operations

September 26-27, 2023

Something went wrong. Please try again.

Join our esteemed experts for an in-depth look into how to modernize your security operations. We’ll cover hot topics such as AI and automation, building effective SecOps programs, and how to align security operations with business objectives through effective strategy. And even better, during each session you’ll be able to ask our experts questions in real-time – to really make the most of your experience. Whether you are an experienced professional managing critical assets, or looking to advance in your cyber security career, you’ll walk away with timely information and best practices integral to securing your organization.

September 26, 2023 | 10:00 AM – 1:00 PM SGT
September 27, 2023 | 10:00 AM – 1:00 PM SGT

September 26

10:00 AM SGT

Synergizing Security and Success: Aligning Strategy with Business Objectives

Play

Something went wrong. Please try again.

Learn more

The presentation highlights the importance of integrating cybersecurity measures with overarching business objectives. This presentation discusses why businesses should see cybersecurity as a Business Enabler (tech thing) and (Baked in) core business strategy. Also, emphasises that in today’s digital landscape, companies can’t afford to view cybersecurity solely as a technical requirement; instead, it should be treated as an essential business enabler. Businesses can prioritise their security efforts more effectively by understanding the risks associated with security breaches and how they can impact a company’s reputation and continuity. The presentation underscores the need to transition from a solely tech-focused approach to one that takes into account the broader business goals. It offers a roadmap on how to achieve this alignment, from conducting a gap analysis to fostering regular inter-departmental communication. The presentation ends by looking at future trends, emphasising that security and business strategies must be seamlessly intertwined for businesses to be future-proof.

10:55 AM SGT

Detection Lifecycle Management – Managing the key input to security operations

Play

Something went wrong. Please try again.

Learn more

Session will describe the importance of managing detection as a key input to security operations to ensure secops is enabled with determinable alerting, efficient analytics, and effective response outcomes.

12:05 PM SGT

Forensics from a CISO’s Perspective

Play

Something went wrong. Please try again.

Learn more

During this session, we will address how your organization needs to think about and preserve forensic evidence before, during, and after incident response.


September 27

10:00 AM SGT

Demystifying dark web threats for security professionals

Play

Something went wrong. Please try again.

Learn more

What is the dark web? What threats can be detected by venturing beyond the network perimeter? As the digital underground continues to thrive and evolve, so too must network defenders and our approach to wholistic network defense. In this session we will illuminate the dark web, discover new techniques for threat detection, and take back the edge from threat actors.

11:10 AM SGT

Defending Data Frontier: Fireside Chat on Digital Forensics & Insider Threats

Play

Something went wrong. Please try again.

Learn more

This session encapsulates an engaging discussion on safeguarding valuable information in today’s digital landscape. With a personal and conversational tone, experts will share insights into investigating cyber incidents, looking at aspects of digital forensics and addressing risks posed by insiders within organizations.

12:20 PM SGT

Utilizing OpenAI on Red Team & Blue Team Activities

Play

Something went wrong. Please try again.

Learn more

Leave with a new perspective on the capabilities and ethical considerations of utilizing AI in cybersecurity. What you will learn:

– Understand how Red Teams can leverage OpenAI for information gathering, weaponization, and advanced exploitation techniques.
– Explore Blue Team use-cases, including intelligence gathering on APTs and malware, incident response, and log analysis.
– Examine the use of fine-tuned AI models for specialized security operations, such as phishing email detection and multi-lingual reporting.
– Demonstrate how OpenAI can facilitate everything from crafting deceptive phishing emails to automating log analysis for threat detection.