VirtualCyberSecuritySummit 2020 Aug. 18, 2020 to Aug. 19, 2020, Virtual, virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Election Cybersecurity 2020 Christopher Krebs In terms of election cybersecurity, is the U.S. better off in 2020 than it was ...
CISO's Perspective: Adapt and Secure Mike Huckaby , Tomas Maldonado , Timothy Rohrbaugh 2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the ...
Zero Trust Access: The Five Step Program Dave Lewis The perimeter-based security approach of the last century is no longer adequate for securing the ...
The Role of Digital Identity in Account Opening & Onboarding Rahim Kaba A poor customer experience and insufficient security in the account opening process has been shown ...
Faking It - How Cyber AI can Combat Digital Fakes Dan Fein Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, ...
An Integrated Approach to Embedding Security Into DevOps Matt Rose N/A
Tech Spotlight: Security Operations In This New Paradigm Renee Tarun With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT ...
What You Don't Understand About Crypto Can Hurt You Brad Beutlich For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the ...
Cyber Defense During a Time of Crisis and After Ran Shahor Any and every one is a target for nation-state grade cyber attacks, especially during a ...
APIs, Digital Transformation and a New Approach to Security Paul Dant When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial ...
Cloud IAM: Enlightenment or Bull$#^&? Alex Snyder Strong identity and access management (IAM) is one key to preventing data breaches and limiting ...
Venture Capitalist View: The State of the Cybersecurity Marketplace Alberto Yepez It's been a seismic year for the global economy, and now sector has been immune ...
Defending Your APIs Against Industrialized Cybercrime Ameya Talwalkar With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to ...
Evolution of the CISO priorities in the COVID-19 era Yassir Abousselham Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams ...
How DAST Solutions can be Maximized through IAST Mark Schembri N/A
Identity & Security: Enabling Remote Work Gurinder Bhatti N/A
Recovering from Ransomware: Managing Stakeholders, Recovering Data, and Cybersecurity Coverage Craig Hoffman , Jeff Chan , Ken Suh , Mark Singer Companies must adapt to meet the ever changing challenges posed by ransomware. Navigating a response ...
The Coming Insider Threat Spike Ofer Israeli In this time of crisis, remote work has become a necessary survival mechanism. However, it ...
One on One: NJ State CISO Michael Geraghty on Resilience, Cybersecurity and the Road Ahead Michael Geraghty The State of New Jersey was at one point part of the epicenter of the ...