Threat actors never stop working and employing new tools to hold your data hostage and take your business down. Attack vectors are often multifaceted and evasive. And the risk of reinjecting vulnerabilities, compromised accounts, and other attack artifacts back into your environment is a pervasive threat. Compared to previous data exfiltration attacks, CISOs and their teams must employ new cyber resilience strategies to protect organizations from ransomware and wiper attacks, and update response strategies to minimize impact. Join this session to learn:
Parham Eftekhari is a recognized business executive in the information security sector with a lifelong passion for leadership, and community engagement. His expertise spans critical infrastructure technology and policy, business strategy and operations, executive advising, and thought leadership content initiatives.
Parham has published over a dozen information security reports, regularly engages with the media, and has contributed to countless briefings and events at institutions including TEDx, Congress, the World Bank, RSA, IFA+, (ISC)2, C-SPAN, and the Institute for Critical Infrastructure Technology (ICIT).
James Blake, Global Cyber Resiliency Strategist – James Blake is Cohesityâs Strategist in Cyber Resiliency. In this role he draws on his nearly three decades of operational experience as a CISO, building Security Operations Centres and leading incident response to provide thought leadership and enablement around cyber resiliency best practices to internal resources and customers, as well as working with our Data Security Alliance partners to create a security ecosystem that delivers innovation. James worked as both the Global Director of Cyber Transformation and Director of Cyber Risk at JPMorgan Chase. He was the CISO of Mimecast from its inception to its IPO. He spent nearly a decade as the Managing Principle leading a consulting practice for HP Enterprise that built, operated and then transferred over 90 end-to-end security operations capabilities for some of the worldâs largest organizations and provided consulting for over 200 more. James and his team were called in to provide response capabilities for several high-profile incidents, including ransomware and wiper attacks such as the 2012 Shamoon attack on Saudi Aramco. He is also the co-founder of the second-largest information security conference in the UK.