CyberSecuritySummitChicago 2020 Sept. 1, 2020 to Sept. 1, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Keynote with Verizon David Grady N/A
Darktrace Presentation: Faking It - How Cyber AI can Combat Digital Fakes Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Ivanti Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Nathan Wenzler , John Bloomer , Chris Pittman , Gajraj Singh , Eric Kretler , Tim Keeler Security teams today are being overwhelmed by the massive amounts of data collected by their ...
HALOCK Security Labs Presentation: CMMC/CCPA. Using Duty of Care Risk to Comply With New Challenges Chris Cronin CMMC and CCPA are very different requirements that push security organizations in new directions. CMMC ...
RedSeal Presentation: Navigating Complexity: A Path Through Too Much Choice Dr. mike Lloyd We’re all trying to protect constantly changing network environments without enough people, and with too ...
Check Point Software Technology: Cyber CEO - Understanding Strategic Convergence of Business & Technology Collaboration Eddie Doyle Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ...
IDMWORKS & Sailpoint Presentation: The Expanding Identity Universe Gray Robinson Identity and Access Management (IAM) advancements are heavily influenced by technology trends in the broader ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Ben Smith , Nick Yokum , Sai Chavali , Steve Litras According to a recent survey, last year 69% of organizations suffered a data breach caused ...
Pulse Secure Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next Sudhakar Ramakrishna The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ...
Duo Security Presentation: Everything Ch-Ch-Ch-Changes - Telework... It's Here to Stay Sean Frazier N/A
Arctic Wolf Presentation: The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
OneTrust Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance Christopher Smith Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ...
Closing Security Keynote with the U.S. Department of Homeland Security Kelley Goldblatt N/A