DataConnectorsPortlandTech-Security 2020 June 4, 2020 to June 4, 2020, Portland, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
CISO Panel | Sharee English , Steve White , Jon P. Washburn , Hadas Cassorla , Michel Romanino , Neil Simon , Richard Appleyard | N/A | |
Threat Hunting & Modern Security: 3 Fundamental Flaws: | Jim Rohde | Security Operations is a discipline continuously evolving – with the evolution of tools and processes, ... | |
Managed Threat and Response Services | Gregory Scott Bennett | “It’s dangerous to go alone! Take this.” So read the first lines of dialogue in ... | |
Cybercrime, Inc: The Business of the Dark Web | Michael Mayes | The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ... | |
Managing Digital Risk in Transformative Times | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
Securing Remote Workers: Scaling Remote Access and Security for All Employees | Bob Gilbert | Working remotely is the new norm. But how can you keep remote workers secure when ... | |
Keynote | Theresa Watters | An overview of the cyber services the US- DHS Cybersecurity and Infrastructure Security Agency (CISA) ... | |
Real talk on ransomware | Stacey Budd | Presentation Abstract / Description: We all know what ransomware is – we know the stats, ... | |
A Centralized Identity Strategy Using Standards Helps Minimize Threats. | Carlos Mostek | Modern architectures continue to become more distributed and fractured. How can developers can continue to ... | |
Risk Management – Insights in a World Gone Crazy | Phil Richards | Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ... | |
Creating Your Defense Plan Against IoT Security Threats | Ryan Malley | Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 ... | |
A Strategy For Securing Your Everything | Grant Asplund | The stakes have never been higher for organizations to get cyber security right. There are ... |