<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4133850&amp;fmt=gif">

Full Agenda

8:30-9:00

Doors Open | Coffee & Continental Breakfast Served

9:00-9:30

Welcome Remarks

Embrace Compliance to Strengthen Your B2B IT Infrastructure: Transforming Compliance into a Strategic Asset

Keynote Speaker: Beth Leonard, Chief Operating Officer, R3

In this opening keynote, Beth Leonard, Chief Operating Officer (COO) at R3, will explore how embracing compliance can be not only effective but also a rewarding and engaging endeavor for your team. By weaving compliance into every facet of your operations, you'll transform it from a mandatory obligation into a powerful tool that supports and enhances your IT infrastructure. 

Discover how a well-funded and meticulously executed compliance program can fortify your organization's technological posture while ensuring seamless regulatory adherence. 

Don't miss this opportunity to revolutionize your approach to compliance. Invest in your compliance program today and lead your organization towards a more secure and compliant future. 

Key Takeaways: 

  • Understand the essential components of a successful compliance program. 
  • Learn how to allocate resources (time, people, money) effectively to compliance initiatives. 
  • Gain insights into integrating compliance seamlessly into your organizational processes. 
  • Discover the benefits of making compliance a fun and engaging part of your IT strategy. 
  • Why engaging with a Microsoft Risk, Compliance & Advisory (RCAP) Partner is beneficial to developing a culture of compliance readiness 

9:35-10:35

A Capabilities Overview of Microsoft Copilot for Security

Presenter: 

  • Carley Salmon, Senior Security Technical Specialist, Microsoft Federal

10:45-11:45

Integrating Microsoft Copilot for Security: Elevate Your Cybersecurity and Compliance Posture

Join us for an innovative session focused on adopting and integrating artificial intelligence (AI) into your cybersecurity and compliance strategy.  

In this session, we will focus on using Microsoft Copilot for Security, an AI-powered solution designed to enhance your organization's security operations. This advanced tool processes vast amounts of security data, detects threats, and provides actionable insights at machine speed, enabling more efficient and effective risk response. 

We will explore the comprehensive scope of Microsoft Copilot for Security across various security domains and address critical aspects of data governance and compliance when implementing AI in security operations. Learn how to navigate regulatory concerns surrounding AI-driven decision-making in security contexts and develop strategies for responsible AI use. 

This session is tailored for security professionals, IT leaders, and compliance officers looking to leverage AI responsibly and effectively. 

Speakers: 

  • Beth Leonard, Chief Operating Officer, R3
  • Kyle McNaney, Chief Technology Officer, R3
  • Stephen Jones, VP of Cybersecurity, R3
  • Carley Salmon, Senior Security Technical Specialist, Microsoft Federal

Key Takeaways: 

  • The capabilities, benefits, and potential of adopting Microsoft Copilot for Security 
  • Best practices for implementing and integrating an AI solution into your operations 
  • Navigating data governance and regulatory challenges that come from using an AI solution 
  • Developing holistic policies for AI use to be implemented in all company processes and procedures. 

11:50-12:50

Networking Lunch

 

1:00-2:00

Advanced Cybersecurity Automation for Compliance

Many organizations face the dual challenge of maintaining robust cybersecurity defenses while ensuring compliance with an ever-growing array of regulations. When done manually, ensuring that your organization is compliant and adhering to these regulations is cumbersome and it leaves the door open to human errors. 

In this session, our panelists will explore how advanced cybersecurity automation can be leveraged to enhance compliance efforts when faced with a security incident, creating a more efficient and effective security posture. 

Speakers: 

  • Stephen Jones, VP of Cybersecurity, R3 
  • Beth Leonard, COO, R3

Key Takeaways: 

  • Continuous Compliance Monitoring: Automated systems can continuously scan networks, applications, and data repositories to ensure ongoing compliance with relevant standards (e.g., GDPR, HIPAA, PCI DSS). 
  • Real-time Policy Enforcement: Automation enables the immediate implementation and enforcement of security policies across an organization's entire digital infrastructure. 
  • Streamlined Auditing Processes: Automation significantly reduces the time and effort required for compliance audits by maintaining up-to-date, comprehensive logs and reports. 
  • Incident Response and Reporting: Automated systems can detect compliance breaches in real-time, initiate response protocols, and generate necessary reports for regulatory bodies. 
  • Integration with Governance, Risk & Compliance (GRC) Platforms: Cybersecurity automation can seamlessly integrate with GRC platforms for a comprehensive approach to compliance management. 

2:10-3:10

Developing a Compliance Program: Integrating Industry Standards into Your Microsoft Tech Stack

In this comprehensive session, our team of security and compliance experts will provide insights into the process of establishing and managing an effective compliance program by harnessing the power of Microsoft's technology stack. Attendees will gain a thorough understanding of risk and compliance fundamentals, learn to identify key areas of overlap in compliance standards, and discover how to leverage Microsoft tools to address these overlaps efficiently. 

We'll explore how to initiate and maintain a compliance program tailored to your organization's unique needs, utilizing Microsoft's robust suite of solutions. These powerful tools offer out-of-the-box reporting capabilities, ensuring seamless compliance with various regulatory requirements. 

From access control and data protection to risk management and incident response, we'll cover the essential components of a comprehensive compliance strategy. You'll learn practical strategies for maintaining data control and security, and gain insights into setting up an information security compliance practice using Microsoft technologies. 

Whether you're embarking on your compliance journey or seeking to enhance your existing program, this session will equip you with the knowledge and tools to achieve and maintain compliance effectively in the ever-evolving landscape of cybersecurity. 

Speakers:  

  • Beth Leonard, Chief Operations Officer, R3 
  • Kyle McNaney, Chief Technology Officer, R3 
  • Carley Salmon, Senior Security Technical Specialist, Microsoft Federal

Key Takeaways: 

  • Gain a comprehensive understanding of risk and compliance fundamentals in cybersecurity 
  • Identify overlapping areas that are consistent in most compliance standards and learn to address them efficiently using Microsoft's integrated suite of tools 
  • Implement robust security measures across access control, data protection, risk management, and network security using Microsoft solutions 
  • Develop strategies for ongoing compliance management, including audit, reporting, third-party risk management, and employee training 
  • Learn best practices for establishing and maintaining a comprehensive information security compliance strategy tailored to your organization's needs 

3:15-4:15

AMA Networking Happy Hour

Join us for an AMA (Ask Me Anything) Networking Happy Hour. Use this time to network with your peers or approach a member of the R3 team, who will be available for any questions left unanswered or topics you would like to expand upon. 

It will be our pleasure to help guide you toward success.  

Space is limited