Enterprise Connect is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Why Communications/CX Tech Needs a Multi-layered Approach to Security

Stephen Semmelroth  (Senior Analyst, AVANT Analytics, AVANT Communication)

Scott Murphy  (Consultant and Vice President, Data Perceptions Inc.)

Tony Lauro  (Director of Security Technology & Strategy, Akamai)

Josh Crosby  (Sales Engineer, Cloudflare)

Brent Feller  (Director of Solutions Architects , eSentire)

Location: Osceola A

Date: Wednesday, March 27

Time: 3:00 pm - 3:45 pm

Pass Type: 3-Day Conference Pass, 4-Day Conference Pass - Get your pass now!

Session Type: Breakout Session

Track: Security & Compliance

Vault Recording: TBD

Many midmarket and enterprise organizations today are barely scratching the surface when it comes to designing, implementing, and managing proven security systems to identify, respond to, and neutralize threats. It's evident more needs to be done to address security issues across all markets and geographical regions. So how does a company evaluate its security posture and build an action plan that is relevant to business outcomes and can be applied to specific technology stacks within the enterprise, including communications/CX? In this session, a panel of security experts will present models and offer advice about how to align the communications/CX technology estate with the requirements and guiding principles that govern the overall enterprise’s CISO organization. You'll come away from this session more equipped to work collaboratively with your enterprise’s security team to ensure your systems are better protected from risk.

Takeaways:

  • What does a multi-layered approach to security look like?
  • How do you assess your organization's current security posture, and plan for strengthening it?
  • How do you plan your technology investments to take into account cybersecurity requirements?