DataConnectorsToronto 2020 May 28, 2020 to May 29, 2020, Toronto, Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Panel: Fariba Rawhani, Madeleyne Vivanco, Mike Glover, Ross Davidson, Shadi Khatib, Sachin Jain | N/a | None | |
Your CEO is Not Your CEO! How to defend against email fraud | Denis Ryan | Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers ... | |
Evolution of An Attack: How a Persistent Threat Actor Adapts to Fool Microsoft | Michael Landewe | The arms race between email attackers and defenders is a long and expensive one. In ... | |
Identity and Access Management: Embracing the complexity | Matthew Marji | Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who ... | |
The Impossible Puzzle of Cybersecurity | Darryl Maurice | With IT teams around the world struggling to keep up with the latest cybersecurity threats, ... | |
Driving the End Game in Cyber Hygiene | Greg Jackman | Critical labor shortages in Cyber Security have created unprecedented demand for solutions to deliver real-time ... | |
Risk Management – Insights in a World Gone Crazy | Phil Richards | Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ... | |
Canadian Cybercrime Awareness and Prevention in 2020 | Sgt. Vern Crowley | The rapid advancement and penetration of cyber and digital technologies is changing the world, and ... | |
The IoT storm … Will we survive the coming deluge? | Robert Falzon | IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzl | Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ... | |
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy | David Huskisson | Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ... | |
How to counter data theft by eliminating the insider threat | Simon Cuthbert | Insider threats are among the top IT security risks organizations today must brace for. Conventional ... | |
Acceleration of digital transformation by COVID-19 | Tony Anscombe | In response to “work from home” and other lockdown measures due to the COVID-19 pandemic, ... | |
Shift Left – Building Security into the Application Development Lifecycle | Rob Arago | By building security into your application development lifecycle you not only help reduce your attack ... | |
Managing Digital Risk in Transformative Times | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
Improving Security for Remote Working – 13 Key Recommendations | Matt Gardiner | Many organizations are in the middle of a work from home (WFH) trial by fire. ... | |
Achieving Secure Remote Access with RDP | Gil Azrielant | With so many employees sheltering in place due to the coronavirus, enterprises with Windows are ... | |
Building an Effective Cyber Training Program for Your Cyber-Pros | Gordon Lawson | In the cybersecurity triad of people, process, and technology, much time and money is spent ... | |
Cybercrime In a post-pandemic world | Detective Bagnall | This presentation will take a 360 degree look at how Cybersecurity needs have changed and ... |