Title |
Speakers |
Summary |
Topic Types |
PANEL 3: Incident Response - What to do Before, During and After a Breach |
Mark Hauptman
,
Jennifer Beckage
,
Tasneem Nipplewala
|
A common phrase in information security is: “It is a matter of when you will ... |
|
Deep Instinct Presentation: Not all AI is Created Equal – Understand the Differences of AI/ML/DL |
Jonathan Kaftzan
|
Machine learning is a big step forward in combatting cyberattacks but is still no silver ... |
|
PANEL 1: Insider Threat - What the CISO and Every IT Security Management Team Must Face & Govern 24/7 |
Peter Stone
,
Dan Greer
,
Jake Mccabe
,
Alex Pitigoi
|
Today 86% of organizations are in the process of building or already have an existing ... |
|
Darktrace Presentation: Cyber AI: Fighting Back with Autonomous Response |
Adrienne Hume
|
The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ... |
|
IDMWORKS Presentation: Best Practices for IAM Assessments, Blueprints & Roadmaps |
Todd Rossin
|
Organizations process and store huge volumes of sensitive information that belong to their customers and ... |
|
Pulse Secure Presentation: Secure Access for Hybrid IT; Ergo Zero Trust and Software Defined Perimeter |
Scott Gordon
|
Any means access to enterprise apps and resources is the new normal, as is news ... |
|
Google Chrome Enterprise Interactive Presentation |
Loren Hudziak
|
N/A |
|
PANEL 2: Cloud INsecurity - Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them |
Patrick Vowles
,
Mark Ostrowski
,
John Mancini
,
Oliver Schuermann
|
For many organizations they are looking at over half of their IT spending being related ... |
|
IBM Interactive Presentation: Securing the Hybrid Cloud |
Patrick Vowles
|
N/A |
|
AppGuard Presentation: Zero Trust Starts at the Endpoint |
Neal Conlon
|
The worldwide cybersecurity spending for 2019 is estimated to be $124B. Despite the hefty amount ... |
|
Cequence Security Presentation: Bulletproof Proxies: Enabling Large Scale Attacks to Hide in Plain Sight |
Will Glazier
|
Bad actors are using sophisticated attack management tools, a constantly refreshed trove of stolen credentials ... |
|
Keynote: What Matters Most in Cyber-Security? |
David Grady
|
What's the single most important component of an effective cyber-security program? Here's a hint: It ... |
|
Closing Keynote Address with the U.S. Department of Homeland Security |
Ron Ford
|
N/A |
|