CyberSecuritySummitCharlotte 2020 Aug. 13, 2020 to Aug. 13, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Security Keynote with Darktrace: Faking It - How Cyber AI can Combat Digital Fakes Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Verizon Presentation: Security by the Numbers: Insights from Verizon’s Recent Research David Grady If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention J. Wolfgang Goerlich , Ben Gritt Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Pulse Secure Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next Sudhakar Ramakrishna The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ...
Cyber CEO - Understanding Strategic Convergence of Business & Technology Collaboration Eddie Doyle Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ...
Arctic Wolf Presentation: The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Chris Pittman , Chris Hinkley , J. Chumley , Homayun Yaqub , Jack Phinney According to a recent survey, last year 69% of organizations suffered a data breach caused ...
IBM Security Presentation: Open Security – from Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
Ivanti Presentation: Continuous Vulnerability Management: Achieving a 14 Day SLA on Vulnerability Remediation Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Closing Security Keynote Jason Burt N/A