OCEANIA CACS
  • Home
  • Programme
    • Programme
  • Speakers
    • Keynote Speakers
    • Invited Speakers
    • Panellists
    • Guest Speaker
  • Contact
  • ISACA Media Highlights
  • PDF
  • Presentation PDFs
  • Home
  • Programme
    • Programme
  • Speakers
    • Keynote Speakers
    • Invited Speakers
    • Panellists
    • Guest Speaker
  • Contact
  • ISACA Media Highlights
  • PDF
  • Presentation PDFs

Diana Volere

Picture
Diana is Saviynt’s Chief Evangelist and a frequent blogger and speaker in cybersecurity, most frequently in identity and security.  She’s spent the last two decades in pre-sales and delivery of cloud security, governance, and identity and access management, working for large vendors and independent consulting organizations. Diana has architected and driven sales of solutions for global Fortune 500 companies, and she has in-depth experience in the healthcare and financial verticals.  Her aptitude for translating complex technology terminology and capabilities to business value and language plays into her passion for assisting organizations through digital transformation.
The Texas Hold ‘Em of Cybersecurity: Mitigating Risky Decisions
Many organizations treat cybersecurity like a game of roulette. Roulette is a risky game of chance where the best strategies involve sticking with one choice and continuously waiting for it to provide a benefit. Many organizations treat their cybersecurity programs the same way, making minimal changes and hoping that they continue to bet lucky. 
While roulette may be a game of chance, Texas Hold ‘Em is a game of statistics. At each step, players review the new cards, apply statistics to their hands, and analyze what to do next. Creating a holistic Identity Governance and Administration (IGA) program based in analytics can turn your cybersecurity posture from a game of roulette to one of Texas Hold ‘Em so that you can better mitigate risky access decisions. 
In this session, we will discuss:
  • Reading The Opening Pot: Assessing Information Asset and User Risk
  • Reading the River: Analyzing Access Risk Changes Across the Request/Review/Certification Cycle
  • Going All In: Continuously Monitoring for Compliance Violations and Mitigating Risk with Analytics
Creating a risk-based IGA program and incorporating context-aware entitlements can mature your data privacy and security program from a game of roulette to a game of Texas Hold ‘Em, giving you more control over protecting your organization. 
Proudly powered by Weebly