CyberSecuritySummitSeattle 2019 June 25, 2019 to June 25, 2019, Seattle, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Security Briefing with the U.S. Secret Service Timothy Hunt N/A
Keynote with Verizon: What Matters Most in Cyber-Security? Jeffrey Duran What’s the single most important component of an effective cyber-security program? Here’s a hint: It ...
Verizon Presentation: The Big Picture – Security, Risk and Data-Driven Decision-Making Jeffrey Duran Join senior executives from BitSight, Tanium, Recorded Future and Cylance for a panel discussion on ...
PANEL 1: Insider Threat – What the CISO and Every IT Security Management Team Must Face & Govern 24/7 Karl Gainey , Zach Turner , Charles Keane , Cory Ranschau , Dana Reed Today 86% of organizations are in the process of building or already have an existing ...
ExtraHop Presentation: Defense in Diversification: Improving cybersecurity through smart consolidation John Matthews Ask any analyst, reporter, or financial observer, and they’ll tell you that the security market ...
Darktrace Presentation: AI for Cyber Defense: The Machine Fights Back Aimee Levan Cyber-attack has become the most significant risk facing today’s businesses, smart cities, and critical infrastructure, ...
Pulse Secure Presentation: Secure Access for Hybrid IT; Ergo Zero Trust and Software Defined Perimeter Teddy Nicoghosian Any means access to enterprise apps and resources is the new normal, as is news ...
PANEL 2: Cloud INsecurity – Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them Jeff Bird , Tracey Pretorius , Dov Goldman , Fleming Shi For many organizations they are looking at over half of their IT spending being related ...
Giving Good the Advantage with Chronicle Evan Derheim IChronicle leverages massive data and compute resources to help enterprises analyze and fight cyber threats. ...
Bromium Presentation: How Hackers Evade Your AI-enabled Endpoint Detection Tools Ian Pratt In this session, Dr. Ian Pratt will talk about how modern malware continues to circumvent ...
PANEL 3: Incident Response – What to do Before, During and After a Breach Scott Giordano , Jim Hollar , Ibrahim Al-islam , Randy Cheek , Rich Thompson , Brian Draper A common phrase in information security is: “It is a matter of when you will ...
Closing Keynote with The U.S. Department of Justice Sean Newell N/A