Data 2020 May 7, 2020 to May 7, 2020, Philadelphia, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Robert Minor, Mark Eggleston, Anahi Santiago, Jim Schott, Dan Walsh, Krista Arndt | N/a | None | |
Managing Digital Risk in Transformative Times | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
Prevention: The Strategic Element in Your Security Stack | Ronen Yehoshuha | Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed ... | |
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. | Andy Fernandez | Ransomware threats increased by 300% last year, and the industry is expecting it to get ... | |
Learn from Fortune 100 Leaders: Protecting Remote Data | Rick Wilson | Even prior to COVID-19, more people were working from home than ever before. According to ... | |
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy | David Huskisson | Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ... | |
How to counter data theft by eliminating the insider threat | Simon Cuthbert | Insider threats are among the top IT security risks organizations today must brace for. Conventional ... | |
How to protect your enterprise the way the U.S. Secret Service protects the President | Sr Cerra | The United States Secret Service has been investigating financial crimes since its inception in 1865. ... | |
What the CCPA Means For Your Security Program | Scott M. Giordano | This presentation describes the many cyber security requirements of the California Consumer Privacy Act and ... | |
Shift Left – Building Security into the Application Development Lifecycle | Rob Aragao | By building security into your application development lifecycle you not only help reduce your attack ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ... | |
Never Pay the Ransom! | Chip Vacek | When prevention fails, never pay the ransom! Ransomware is targeting schools, municipalities, healthcare and other ... | |
Continuous Vulnerability Management: Striving for a 14 Day SLA | Chris Goettl | The importance of having a continuous vulnerability management process as part of an overall security ... |