Sessions in this track are focused on the ongoing process of discovering, correcting, and preventing security problems, and implanting plans to address future risks.
Topics include:
- Business impact analysis (vulnerability scan, dependencies)
- 3rd party risk + supply chain
- Penetration testing (social engineering, infrastructure, whitebox, blackbox)
- Data control risk assessment (data flow map)
- Cyber insurance
- Crisis management
- Risk appetite