CyberSecuritySummitCharlotte 2020 Aug. 13, 2020 to Aug. 13, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Security Keynote with Darktrace: Faking It - How Cyber AI can Combat Digital Fakes | Dan Fein | Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... | |
Verizon Presentation: Security by the Numbers: Insights from Verizon’s Recent Research | David Grady | If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ... | |
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention | J. Wolfgang Goerlich , Ben Gritt | Security teams today are being overwhelmed by the massive amounts of data collected by their ... | |
Pulse Secure Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next | Sudhakar Ramakrishna | The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ... | |
Cyber CEO - Understanding Strategic Convergence of Business & Technology Collaboration | Eddie Doyle | Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ... | |
Arctic Wolf Presentation: The Path to Security Effectiveness | Sam Mclane | It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... | |
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error | Chris Pittman , Chris Hinkley , J. Chumley , Homayun Yaqub , Jack Phinney | According to a recent survey, last year 69% of organizations suffered a data breach caused ... | |
IBM Security Presentation: Open Security – from Patchwork to Platform | Patrick Vowles | As organization adopt new technologies and utilize the cloud for business innovation and growth, security ... | |
Ivanti Presentation: Continuous Vulnerability Management: Achieving a 14 Day SLA on Vulnerability Remediation | Chris Goettl | When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... | |
Closing Security Keynote | Jason Burt | N/A |