DataConnectorsNewYork 2020 Aug. 19, 2020 to Aug. 20, 2020, Virtual, virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Continuous Vulnerability Management: Striving for a 14 Day SLA Chris Goettl The importance of having a continuous vulnerability management process as part of an overall security ...
Credential Harvesting As a Service: How this Dark Web Organization Steals Your Microsoft Credentials Presentation Michael Landewe In this presentation, we will analyze the attack methods of a single advanced persistent threat ...
Threat Hunting & Modern Security: 3 Fundamental Flaws Jim Rohde Security Operations is a discipline continuously evolving – with the evolution of tools and processes ...
Introduction to Risk-Based Vulnerability Management Ed Bellis Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large ...
Panel 1: Identity: the New Perimeter? Mark Ramsey , Gene Barskiy , Gene Zafrin , Dr. Chandana Unnithan , Christopher C The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles ...
Keynote Thomas Flynn , Mark Norberg Tom will discuss the USSS’ current posture during the COVID19 pandemic. He will discuss how ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
Get Rich Quick with Ransomware! A Lazy Hacker’s Perspective for Enterprises Gil Azrielant Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, ...
Deciphering SOC 2 Compliance in Cloud-Native Environments Cynthia Burke How did a fairly straightforward endeavor – an IT audit – become that monster under ...
Three Things You Need to Know About New CCPA Regulations Esq. , Scott M. Giordano This presentation describes the many cyber security requirements of the California Consumer Privacy Act. Included ...
Panel 2: AI & ML in Cybersecurity: Can we ‘Science the heck’ out of trouble? Mark Ramsey , Gene Barskiy , Gene Zafrin , Dr. Chandana Unnithan , Christopher Coyle We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
Managing Digital Risk Amid Disruption Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
How do you start a ML project? Finding the Breach with Infinity SOC Elie Klein What is Machine Learning? Can you decipher buzzwords such as Artificial Intelligence, machine or deep ...
Panel 3: Users as the Attack Vector – People and Security Jamie Herman , Sajed Naseem , James Dawson , Mike Wilkes , Juan P. Morales , Masha Demidova Users, those oft-confused carbon-based life forms usually roaming the halls of our office buildings, are ...
Shift Left – Building Security into the Application Development Lifecycle Rob Aragao By building security into your application development lifecycle you not only help reduce your attack ...
2020: The Passwordless Decade George Avetisov As we enter the passwordless decade, more and more organizations are asking the question: How ...
A People-Centric Approach to Cyber Risk Management Jack Johnson Today’s threat landscape is characterized by attacks which focus on humans. For the third straight ...
Reducing Friction and Managing Remote Work Environments Richard Melick The business world has changed and many of those changes, like remote working, are here ...
Panel 4: Ransomware – to Pay, or Not to Pay? Jamie Herman , Sajed Naseem , James Dawson , Mike Wilkes , Juan P. Morales , Masha Demidova Ransomware has been a hot topic of 2020, as bad actors show there is no ...