CybersecuritySummitBoston 2019 Nov. 6, 2019 to Nov. 6, 2019, Boston, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
PANEL 3: Incident Response - What to do Before, During and After a Breach Mark Hauptman , Jennifer Beckage , Tasneem Nipplewala A common phrase in information security is: “It is a matter of when you will ...
Deep Instinct Presentation: Not all AI is Created Equal – Understand the Differences of AI/ML/DL Jonathan Kaftzan Machine learning is a big step forward in combatting cyberattacks but is still no silver ...
PANEL 1: Insider Threat - What the CISO and Every IT Security Management Team Must Face & Govern 24/7 Peter Stone , Dan Greer , Jake Mccabe , Alex Pitigoi Today 86% of organizations are in the process of building or already have an existing ...
Darktrace Presentation: Cyber AI: Fighting Back with Autonomous Response Adrienne Hume The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ...
IDMWORKS Presentation: Best Practices for IAM Assessments, Blueprints & Roadmaps Todd Rossin Organizations process and store huge volumes of sensitive information that belong to their customers and ...
Pulse Secure Presentation: Secure Access for Hybrid IT; Ergo Zero Trust and Software Defined Perimeter Scott Gordon Any means access to enterprise apps and resources is the new normal, as is news ...
Google Chrome Enterprise Interactive Presentation Loren Hudziak N/A
PANEL 2: Cloud INsecurity - Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them Patrick Vowles , Mark Ostrowski , John Mancini , Oliver Schuermann For many organizations they are looking at over half of their IT spending being related ...
IBM Interactive Presentation: Securing the Hybrid Cloud Patrick Vowles N/A
AppGuard Presentation: Zero Trust Starts at the Endpoint Neal Conlon The worldwide cybersecurity spending for 2019 is estimated to be $124B. Despite the hefty amount ...
Cequence Security Presentation: Bulletproof Proxies: Enabling Large Scale Attacks to Hide in Plain Sight Will Glazier Bad actors are using sophisticated attack management tools, a constantly refreshed trove of stolen credentials ...
Keynote: What Matters Most in Cyber-Security? David Grady What's the single most important component of an effective cyber-security program? Here's a hint: It ...
Closing Keynote Address with the U.S. Department of Homeland Security Ron Ford N/A