DataConnectorsBoston 2020 June 11, 2020 to June 11, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CISO Panel Esmond Kane , Mark Maybury , Eric Hussey , Dimitrity Sokolovskiy , Michael Woodson N/A
Managing Digital Risk in Transformative Times Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
Implementing Security at the Speed of Innovation Austin Britt There is no question that every organization is struggling to prevent cyber attacks, especially when ...
Threat Hunting & Modern Security: 3 Fundamental Flaws: Jim Rohde Security Operations is a discipline continuously evolving – with the evolution of tools and processes, ...
Risk Management – Insights in a World Gone Crazy Phil Richards Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ...
Introduction to Proactive Prevention Netta Schmeidler Despite continued infosec investments, data breaches continue while companies contend withcomplicated security architectures composed of ...
TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments Emily Couch You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last ...
Keynote Fred Regan Frederick will provide an informal discussion on the following topics:Overview of USSS Cyber Fraud Task ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
Introduction to Risk-Based Vulnerability Management Ed Bellis Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large ...
The Evolution of Zero Trust in a New Age of Security Cory Pellegren As we shift our focus from the data center to the cloud and containers, it ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
Secure the Enterprise with AI-Powered Adaptive Authentication Brandon Simons With the risk of cyberattack continuing to increase due to perpetrators finding smarter and less-detectable ...
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices Jeff Horne For many years now, enterprise networks have seen an explosive rise in devices that are ...