Pre-Conference Workshops
Tuesday, November 19
9:50 am Check In & Coffee
10:00 am – 1:00 pm | Workshop A
Bullet-Proofing Third Party Risk Management Strategies to Recognize & Alleviate Risks Posed by Third Party Components
Synopsis
Third-party risk management is a complex and resource-intensive challenge faced within cybersecurity as it requires comprehensive oversight and control over external vendors and suppliers, who may have varying security practices and standards. The complexity of supply chains and the potential for hidden vulnerabilities make it challenging to fully assess and mitigate risks introduced by third-party components and services.
Highlights include:
- Implementing comprehensive vendor assessment and monitoring protocols to ensure continuous evaluation of third-party security practices
- Leveraging advanced analytics and threat intelligence to identify and mitigate risks from third-party components in real time
- Developing robust incident recovery plans to manage security breaches involving third-party vendors
1:00 pm – 2:00 pm Lunch & Networking
2:00 pm – 5:00 pm | Workshop B
Optimizing Adaptable Threat Modelling Strategies in Cybersecurity to Enhance Protection of Medical Devices
Synopsis
Threat modelling is an ever-evolving challenge due to the constantly evolving threat landscapes. With the rise of advanced technologies our capabilities to accurately predict how an attacker might exploit vulnerabilities demands continuous refinement. It appears technological advancement is always two steps ahead of our threat modelling methods. It also involves optimal cross-functional collaboration throughout the security development lifecycle to consistently maintain and apply threat models.
Highlights include:
- Integrating advanced analytics for proactive threat identification
- Balancing automation and human expertise in threat modelling
- Case study-based insights into threat modelling frameworks and practices to curate effective solutions to overcome threats.