DataConnectorsMinneapolis&DesMoines 2020 May 14, 2020 to May 14, 2020, Minneapolis, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CISO Panel Bryan Charles Kissinger , Matt Ireland , Ryan Mulhall , Meg Anderson , Leigh White , Rohit Tandon N/A
Threat Hunting & Modern Security: 3 Fundamental Flaws: Jim Rohde Security Operations is a discipline continuously evolving – with the evolution of tools and processes, ...
Decade of the RATs: Corporate Espionage Attacks by Chinese APTs Chris Pittman Did you know five APT groups performed a decade of cross-platform cyber espionage attacks targeting ...
Cybercrime, Inc. The Business of the Dark Web Michael Mayes The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
How to Take a Proactive Security Posture During COVID-19 by Learning from Incident Case Studies Ryan Burkhard What are the trends that organizations are facing when it comes to cyber attacks? We ...
Keynote Session Jd Gabbard N/A
Improving Security for Remote Working – 13 Key Recommendations Matthew Gardiner Many organizations are in the middle of a work from home (WFH) trial by fire. ...
5 Action Items for Creating an Incident Response Plan Relevant to Your Organization Dennis Brown If your network hasn’t been threatened yet, it will be. If your network has been ...
ProCircular – Ransomware Negotiations Aaron R. Warner N/A
Three Things You Need to Know About New CCPA Regulations Scott M. Giordano This presentation describes the many cyber security requirements of the California Consumer Privacy Act and ...
Continuous Vulnerability Management: Striving for a 14 Day SLA Chris Goettl The importance of having a continuous vulnerability management process as part of an overall security ...