CyberSecuritySummitSeattle 2020 July 28, 2020 to July 28, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Security Briefing with the FBI Andrew Sekela N/A
Security Keynote with Darktrace: Securing the Future of Work: How Cyber AI Learns on the Job Nicole Eagan Global disruption has taught us that the only thing that is certain, is things will ...
ExtraHop Presentation: Right-Sizing Risk - How to Talk to the Board About Cybersecurity Jeff Costlow As enterprises have become increasingly reliant on technology for every aspect of operations, technical executives ...
Check Point Software Technologies Presentation: Cyber CEO Eddie Doyle Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Scott Giordano , Sean Frazier , Regine Bonneau , Adam Palmer , Marcus Session Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Code42 Presentation: Building an Insider Threat Program without Becoming Big Brother Todd Thorsen N/A
Afternoon Security Keynote with the U.S. Secret Service Richard Dean N/A
Thales Presentation: A New Security Reality - Data IS the Perimeter Gina Scinta We all know that the operating paradigm in which business is conducted changes on almost ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Tony Anscombe , Christopher Chandler , Duncan Godfrey , Perez-etchegoyen , Rex Tolman According to a recent survey, last year 69% of organizations suffered a data breach caused ...
HYPR Presentation: 2020 - The Passwordless Decade George Avetisov As we enter the passwordless decade, more and more organizations are asking the question: How ...
Arctic Wolf Presentation: The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Ivanti Presentation: Continuous Vulnerability Management: Achieving a 14 Day SLA on Vulnerability Remediation Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Closing Keynote with the U.S. Department of Homeland Security Klint Walker During this session, Cybersecurity Advisor Klint Walker will discuss:The New Cyber Security Threats & Trends ...