VP, CISO, IT Infrastructure
Many organizations have adopted machine learning and data analytics to help them identify security anomalies. However, mere identification isn’t good enough in a world where Petya and other modern attacks can take down 15,000 servers in a single organization in under two minutes. To combat these new types of malware, organizations need to be looking at Model-Driven Security Orchestration, where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Aetna will provide an overview of our security orchestration program, including what worked, what didn’t and lessons learned.
8:30 AM True Cyber-Resilience: Merging the Capabilities of Cybersecurity, Business Continuity, and Enterprise Resilience
The growing number of information security breaches and attacks are a top threat to business operations. Integrating incident response and continuity planning with enterprise risk management empowers well-coordinated actions in the case of an actual event. Accountability, transparency, and continuous improvement are key attributes to sound risk management. The core of information security risk management merges governance, emerging technologies, system hardening, and cultural awareness. Enterprises control readiness and must balance sustainable programs that safeguard information along with meeting the organizational business objectives.
In this session:
•Leveraging investments and creating a consistent cyber defense
•Emphasizing best practices with authentication, patching, vulnerability management, and penetration testing
•Improving security training and providing clear protocols of escalation
•Providing consistent and coordinated information