Title |
Speakers |
Summary |
Topic Types |
Security Keynote with Verizon |
David Grady
|
N/A |
|
Darktrace Presentation: Faking It - How Cyber AI can Combat Digital Fakes |
Dan Fein
|
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... |
|
Ivanti Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA |
Chris Goettl
|
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... |
|
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention |
Nathan Wenzler
,
John Bloomer
,
Chris Pittman
,
Gajraj Singh
,
Eric Kretler
,
Tim Keeler
|
Security teams today are being overwhelmed by the massive amounts of data collected by their ... |
|
HALOCK Security Labs Presentation: CMMC/CCPA. Using Duty of Care Risk to Comply With New Challenges |
Chris Cronin
|
CMMC and CCPA are very different requirements that push security organizations in new directions. CMMC ... |
|
RedSeal Presentation: Navigating Complexity: A Path Through Too Much Choice |
Dr. mike Lloyd
|
We’re all trying to protect constantly changing network environments without enough people, and with too ... |
|
Check Point Software Technology: Cyber CEO - Understanding Strategic Convergence of Business & Technology Collaboration |
Eddie Doyle
|
Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ... |
|
IDMWORKS & Sailpoint Presentation: The Expanding Identity Universe |
Gray Robinson
|
Identity and Access Management (IAM) advancements are heavily influenced by technology trends in the broader ... |
|
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error |
Ben Smith
,
Nick Yokum
,
Sai Chavali
,
Steve Litras
|
According to a recent survey, last year 69% of organizations suffered a data breach caused ... |
|
Pulse Secure Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next |
Sudhakar Ramakrishna
|
The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ... |
|
Duo Security Presentation: Everything Ch-Ch-Ch-Changes - Telework... It's Here to Stay |
Sean Frazier
|
N/A |
|
Arctic Wolf Presentation: The Path to Security Effectiveness |
Sam Mclane
|
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... |
|
OneTrust Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance |
Christopher Smith
|
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ... |
|
Closing Security Keynote with the U.S. Department of Homeland Security |
Kelley Goldblatt
|
N/A |
|