Title |
Speakers |
Summary |
Topic Types |
Opening Security Briefing with The U.S. Secret Service & FBI |
Alan Renner
|
N/A |
|
ExtraHop Keynote: Right-Sizing Risk - How to Talk to the Board About Cybersecurity |
Curtis Walters
|
As enterprises have become increasingly reliant on technology for every aspect of operations, technical executives ... |
|
Darktrace Presentation: Faking It - Combatting Email Impersonation with AI |
Dan Fein
|
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... |
|
IDMWORKS Presentation: Identity Transformation is Digital Transformation |
Bobby Conway
|
Digital business demands seamless user experiences, interoperability among a diverse set of platforms, and near ... |
|
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention |
Patrick Vowles
,
Eyal Elyashiv
,
Dan Webber
|
Security teams today are being overwhelmed by the massive amounts of data collected by their ... |
|
Blue Hexagon Presentation: Combatting Network Threats With Deep Learning |
Francisco Najera
|
The collective efforts of attackers have fundamentally changed the cyberdefense game. Today, adversaries are sophisticated, ... |
|
Verizon Presentation: You Can't Do It All. So What Should You Do? |
David Grady
|
Emerging regulations, transformative technologies and a global security-talent shortage is putting extraordinary pressure on security ... |
|
IBM Presentation: Securing the Hybrid Cloud |
Patrick Vowles
|
N/A |
|
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error |
John Cook
,
Joe Bennett
,
David Pearson
,
Achint Sehgal
,
Brad Tompkins
,
Nick Yokum
|
According to a recent survey, last year 69% of organizations suffered a data breach caused ... |
|
Google Presentation: Securing the Endpoint - Chrome Enterprise’s Innovative Approach to Endpoint Security |
Loren Hudziak
|
N/A |
|
Check Point Software Presentation: Achieving Continuous Compliance at the Speed of Cloud |
Lee Psinakis
|
Using public clouds for enterprise datacenters has become mainstream and hybrid multi-cloud is the new ... |
|
Spirion Presentation: The New CCPA Regulations and What They Mean for Your Information Security Program |
Scott Giordano
|
On October 10, 2019, the California Attorney General published regulations for implementing the California Consumer ... |
|
RedSeal Presentation: Commonly Missed Fundamentals Needed for Effective Cybersecurity |
Sukesh Garg
|
Most breaches are caused by exploiting oversights in basic cybersecurity hygiene. But complex networks often ... |
|
Closing Keynote with the U.S. Department of Homeland Security |
Klint Walker
|
N/A |
|