CyberSecuritySummitLosAngeles 2019 Dec. 5, 2019 to Dec. 5, 2019, Los Angeles, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Security Briefing with the U.S. Department of Justice: Partnership in Practice Jay Bratt N/A
Morning Security Keynote with ExtraHop: Right-Sizing Risk - How to Talk to the Board About Cybersecurity Raja Mukerji As enterprises grow increasingly reliant on technology for every aspect of operations, CISOs have found ...
Cequence Security Presentation: A Frictionless Approach to API Security Matt Keil APIs. They’ve been around for years in one form or another, bringing the benefits of ...
Blue Hexagon Presentation: Combatting Network Threats With Deep Learning Danelle Au The collective efforts of attackers have fundamentally changed the cyberdefense game. Today, adversaries are sophisticated, ...
PANEL 1: Insider Threat - What the CISO and Every IT Security Management Team Must Face & Govern 24/7 Eric Freeman , Jeremy Ventura , Ryan Worlton Today 86% of organizations are in the process of building or already have an existing ...
IDMWORKS Presentation: Best Practices for IAM Assessments, Blueprints & Roadmaps Todd Rossin Organizations process and store huge volumes of sensitive information that belong to their customers and ...
Pulse Secure Presentation: Secure Access for Hybrid IT; Ergo Zero Trust and Software Defined Perimeter Scott Gordon Any means access to enterprise apps and resources is the new normal, as is news ...
Spirion Presentation: The New CCPA Regulations and What They Mean for Your Information Security Program Scott Giordano On October 10, 2019, the California Attorney General published proposed regulations for implementing the California ...
Deep Instinct Presentation: Not all AI is Created Equal – Understand the Differences of AI/ML/DL Nadav Maman Machine learning is a big step forward in combatting cyberattacks but is still no silver ...
PANEL 2: Cloud INsecurity - Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them Jeff Bird , Zoe Lindsey , Conrad Smith For many organizations they are looking at over half of their IT spending being related ...
Darktrace Presentation: Cyber AI - Fighting Back with Autonomous Response Kristina Harris The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ...
PANEL 3: Incident Response - What to do Before, During and After a Breach Melissa Raney , Chase Hinson , Nia Samir , John Wood A common phrase in information security is: “It is a matter of when you will ...
Closing Keynote Address with the U.S. Department of Homeland Security Joe Oregon N/A