NOTICE: Branded Content
NOTICE: Certain versions of content (“Material”) accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.
Protect Your Assets
cancel

More to see at our Cybersecurity Summit, including Partner roundtables

More to see at our Cybersecurity Summit, including Partner roundtables

Micro Focus Frequent Contributor cynthia.leonard1 Micro Focus Frequent Contributor

It’s hard to believe it’s already September, kids are back in school, the smell of pumpkin spiced lattes fills the air, and the Micro Focus Cybersecurity Summit 2018 is almost here. To recap, it is happening on September 25-27, at the Omni Shoreham in Washington, D.C. This conference is an excellent opportunity for the C-Suite and other Security professionals to get educated, build their skills and network around the challenges they face every day protecting their users, apps and data.

If you haven’t registered yet, it is FREE and I am glad to report there are still some spaces left. If you are planning on joining us, we are excited to have demo stations featuring our new end-to-end security platform for the enterprise. However there is much more to see at this security conference, including our four tracks: risk, privacy and compliance; enabling your business through digital transformation; DevSecOps; and addressing threats, attacks and data breaches.

The Cybersecurity Summit also offers a great opportunity to engage with our Micro Focus Channel and Alliance Partnerships and you will not want to miss these exciting Sponsor roundtables and the SAP workshop. Attendees should plan to join one or more of our GOLD Partners on Wednesday, September 26, 2018 at 11:45 to 12:15pm for a roundtable located in the BirdCage Walk.  Choose from these exciting discussions:

ROUNDTABLE TOPICS:

idm.png Title:  Best Practices for IAM Assessments, Blueprints & Roadmaps
Host:  Sean Harris, VP, IDMWORKS
Summary:  This roundtable will address the most common questions around Identify Access Management (IAM) Assessments & Roadmaps: Why Should We Assess? What Should We Assess? When Should We Reassess?  Join IDMWorks to learn more!

 

novacoastpng Title: Dev/Sec Ops
Host: Jon Poon – VP of Security Services, Novacoast, Inc.
Summary:  Does your organization have some sort of infrastructure or application platform running in the cloud? What are people doing to secure these cloud platforms? Let’s discuss the orchestration process for building and deploying applications and how/where you can inject security into that process. We’ll start with a sample workflow and follow the process all the way from developer workstations all the way through the code repository, testing/validation, system build/test, and promotion into production environments.

saltworks.png Title: Scaling Application Security Programs
Presenter:  Dennis Hurst, Founder & CEO, Saltworks
Summary:  Application security typically starts with implementation of a policy that instructs developers of the standards they must follow and the purchase of solutions to support this policy, such as Fortify Static and Dynamic solutions -- then the roll out begins.  This is typically where companies run into challenges.  This round table will discuss lessons learned from multiple large scale implementations for Fortify Static and Dynamic solutions using both Fortify on Demand and Fortify on-premise.

sona.pngTitle:  The Shifting Landscape of Supply Chain Attacks
Presenter:  Curtis Yanko, Dir. Strategy and Global Alliances
Summary:   A shifting battlefield of attacks based on Open Source Software (OSS) consumption has emerged. Today, we’ll discuss how we got here, and how developers can fight back. 

 

gca.pngTitle:  Bridging Compliance Gaps by Integrating ITSM with IGA

Host:  Robert Ivey, Chief Technology Officer at GCA Technology Services
Summary:  IGA tools can provide a significant level of automation to help with user access reviews, timely provisioning of access, auditable approval processes and verifiable terminations to all systems in which they are integrated.  Unfortunately, this rarely covers everything in an enterprise.  ITSM tools provide avenues to provision and de-provision access to numerous other systems, but lack the compliance controls that IGA tools have for regulators.  By using an integrated approach, the compliance tools of IGA can leverage the reach of ITSM to provide an enterprise-wide governance strategy.

vivit.pngTitle:  Next Steps:  Leveling Up after the Cybersecurity Summit with Your User Community
Host:  Chris Carpenter, Bienabee Technologies/Vivit Board Director
Summary:  Take your Summit knowledge and network with peers to share best practices and discover the resources available through Vivit Worldwide, your Independent Micro Focus User Community.

SAP Workshop located in the Executive Room, 1st level 

sap.pngTitle:  Application Security for SAP Solution Landscapes – moving to DevSECOps with SAP Fortify by Micro Focus and SAP NW Application Server add on for Code Vulnerability Analysis
Presenter:  Lorie Schenck, Product Manager, SAP
Summary:  DevSecOps and continued testing are the industry standards for the digital transformation software development lifecycle. These practices help to improve code quality, secure the application layer, increase customer satisfaction and develop high quality applications for both, web and mobile apps on SAP Solution and non-SAP Solution Platforms.  Learn how Micro Focus has co-innovated with SAP to deliver a complete DevSecOps solution portfolio that helps accelerate, secure, and ensure a high quality SAP design, operation, and performance. Understand how a DevSecOps best-practices approach to software quality implementing continues testing practices can contribute to the rapid digital transformation. 

Looking forward to networking and this great opportunity to meet face-to-face with our customers and prospects to exchange best practices for security operationsapplication security, identity and access management (IAM)endpoint management and data security. Hope to see you there! 

 

Follow Micro Focus Security on Twitter and use the hashtag #MicroFocusCyberSummit to stay up to date on the Cybersecurity Summit.

0 Kudos