SecureWorldChicago 2020 Aug. 13, 2020 to Aug. 13, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Executive Roundtable: NOW What Are You Including in Your Incident Response Plan? Milinda Kapetansky N/A
Opening Keynote: Cybersecurity as a Key Element of Enterprise Risk Management Tamika Puckett With the increased complexity of cyber threats and lack of skilled professionals to address those ...
Security Awareness: Another Brick in the Wall Alexandra Panaretos Security awareness and training. The Human Element. Change Management. All of these have resulted in ...
Attack on Home Base: Cybercrime Tactics and Techniques Kevin Kennedy The coronavirus pandemic has left the world looking very different now than it did at ...
Leveraging the Three Lines of Defense to Improve Your Security Position Brendan Campbell Depending on your role, a three lines of defense risk management model can be your ...
Hey, Information Security: Be Part of the Digital Transformation or Be Left Behind! Sandy Silk “Digital transformation” (Dx) as a buzzword may be approaching the end of its life, but ...
Panel: Identity and Access Management: Zero Trust for the Win? Sami Smith N/A
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready? James Goepel Supply chain risks are at the top of everyone’s mind today, and the US Department ...
Automation in the New Normal: Rapid On/Offboarding of Workers Anywhere, and on Any Device Kelsey Nelson The rapid shift to remote, distributed workforces has forced IT professionals to quickly support new/expanded ...
Keynote Fireside Chat: Business Continuity Planning During the COVID-19 Pandemic Milinda Hanson Susan and Milinda are Provation COVID-19 Task Force members leading their organization through these challenging ...
Pivoting Your Cybersecurity Program to the New Normal Randy Raw We are living in different times that demand different ways of thinking. Many existing Information ...
Changing Cyber Landscapes: The Battle of Algorithms David Masson Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyberattacks exponentially more ...
Panel: No Perimeter: Security in the Cloud Jonathan Nguyen-duy , Eric Wolff , Kevin Dillaway , Susan St. Claire Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an ...
New Remote Workforce: Privacy and Security Risks and Mitigations Jordan Fischer The sudden growth in the remote workforce exposed critical cybersecurity and privacy concerns that should ...
Panel: Threat Landscape in Flux: Emerging Threats Mike Lloyd , Kevin Kennedy , Myla Pilao , Ryan Gritt The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ...
VIPR Report: The Verizon Incident Preparedness and Response Report – Taming the Data Breach John Grim Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes ...
Closing Keynote: People, Processes, and Tech Strategies: Recruit, Train, and Retain for Success! Mark Eggleston While most security teams leverage these key resources to reduce risk in our programs, how ...