DataConnectorsBoston 2020 June 11, 2020 to June 11, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
CISO Panel | Esmond Kane , Mark Maybury , Eric Hussey , Dimitrity Sokolovskiy , Michael Woodson | N/A | |
Managing Digital Risk in Transformative Times | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
Implementing Security at the Speed of Innovation | Austin Britt | There is no question that every organization is struggling to prevent cyber attacks, especially when ... | |
Threat Hunting & Modern Security: 3 Fundamental Flaws: | Jim Rohde | Security Operations is a discipline continuously evolving – with the evolution of tools and processes, ... | |
Risk Management – Insights in a World Gone Crazy | Phil Richards | Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ... | |
Introduction to Proactive Prevention | Netta Schmeidler | Despite continued infosec investments, data breaches continue while companies contend withcomplicated security architectures composed of ... | |
TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments | Emily Couch | You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last ... | |
Keynote | Fred Regan | Frederick will provide an informal discussion on the following topics:Overview of USSS Cyber Fraud Task ... | |
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. | Andy Fernandez | Ransomware threats increased by 300% last year, and the industry is expecting it to get ... | |
Introduction to Risk-Based Vulnerability Management | Ed Bellis | Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large ... | |
The Evolution of Zero Trust in a New Age of Security | Cory Pellegren | As we shift our focus from the data center to the cloud and containers, it ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ... | |
Secure the Enterprise with AI-Powered Adaptive Authentication | Brandon Simons | With the risk of cyberattack continuing to increase due to perpetrators finding smarter and less-detectable ... | |
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices | Jeff Horne | For many years now, enterprise networks have seen an explosive rise in devices that are ... |