VirtualCyberSecuritySummit 2020 Aug. 18, 2020 to Aug. 19, 2020, Virtual, virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Election Cybersecurity 2020 | Christopher Krebs | In terms of election cybersecurity, is the U.S. better off in 2020 than it was ... | |
CISO's Perspective: Adapt and Secure | Mike Huckaby , Tomas Maldonado , Timothy Rohrbaugh | 2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the ... | |
Zero Trust Access: The Five Step Program | Dave Lewis | The perimeter-based security approach of the last century is no longer adequate for securing the ... | |
The Role of Digital Identity in Account Opening & Onboarding | Rahim Kaba | A poor customer experience and insufficient security in the account opening process has been shown ... | |
Faking It - How Cyber AI can Combat Digital Fakes | Dan Fein | Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, ... | |
An Integrated Approach to Embedding Security Into DevOps | Matt Rose | N/A | |
Tech Spotlight: Security Operations In This New Paradigm | Renee Tarun | With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT ... | |
What You Don't Understand About Crypto Can Hurt You | Brad Beutlich | For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the ... | |
Cyber Defense During a Time of Crisis and After | Ran Shahor | Any and every one is a target for nation-state grade cyber attacks, especially during a ... | |
APIs, Digital Transformation and a New Approach to Security | Paul Dant | When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial ... | |
Cloud IAM: Enlightenment or Bull$#^&? | Alex Snyder | Strong identity and access management (IAM) is one key to preventing data breaches and limiting ... | |
Venture Capitalist View: The State of the Cybersecurity Marketplace | Alberto Yepez | It's been a seismic year for the global economy, and now sector has been immune ... | |
Defending Your APIs Against Industrialized Cybercrime | Ameya Talwalkar | With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to ... | |
Evolution of the CISO priorities in the COVID-19 era | Yassir Abousselham | Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams ... | |
How DAST Solutions can be Maximized through IAST | Mark Schembri | N/A | |
Identity & Security: Enabling Remote Work | Gurinder Bhatti | N/A | |
Recovering from Ransomware: Managing Stakeholders, Recovering Data, and Cybersecurity Coverage | Craig Hoffman , Jeff Chan , Ken Suh , Mark Singer | Companies must adapt to meet the ever changing challenges posed by ransomware. Navigating a response ... | |
The Coming Insider Threat Spike | Ofer Israeli | In this time of crisis, remote work has become a necessary survival mechanism. However, it ... | |
One on One: NJ State CISO Michael Geraghty on Resilience, Cybersecurity and the Road Ahead | Michael Geraghty | The State of New Jersey was at one point part of the epicenter of the ... |