DataConnectorsSacramento 2020 June 18, 2020 to June 18, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CISO Panel Hadas Cassorla , Thomas Boon , Stephen Clemons , Ian Fitzgerald , Michael Hamilton N/A
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated Michael Landewe The arms race between email attackers and defenders is a long and expensive one. In ...
A Modern Approach to Deception Jonathan Randall Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm ...
CyberSecurity Ratings: Market Forces and Future Considerations David Ortiz In this session, David will examine the most prevalent issues that attribute to third party ...
Securing Remote Workers: Scaling Remote Access and Security for All Employees Bob Gilbert Working remotely is the new norm. But how can you keep remote workers secure when ...
Managing Digital Risk in Transformative Times Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
Keynote Tom Edwards The U.S. Secret Service will discuss their role in defending our critical financial infrastructure, and ...
Identity and Access Management: Embracing the complexity Matthew Marji Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who ...
Creating Your Defense Plan Against IoT Security Threats Ryan Malley Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 ...
Using Threat Intelligence to Inform Your Security Program Sara Boddy As the global pandemic evolves, many organizations are adjusting to the dramatic increase in remote ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
Building Cyber Resilience: Finding Factors not Fault Mark Sangster Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ...
The Present and Future of IoT Security Matt Laurens We are on the verge of entering our 4th industrial revolution: the era of the ...
Gain Visibility into On-Premises and Cloud Networks to Optimize Performance and Security Mohit Jalori Current trends and disruptive technologies add layers of complexity and security risks to networks. But ...