Code42InsiderRiskSummit 2020 Sept. 17, 2020 to Sept. 17, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Insider Threat or Insider Risk — What Are You Trying to Solve? Joe Theis Let's kick the day off strong. You can't miss the start of the inaugural Insider ...
How to Turn Your Workforce into an Extended Security Ally Masha Sedova Organizations are learning that their workforces are valuable allies in a successful insider threat program. ...
The Psychology Behind an Insider Elsine Van Os What happens when individuals conduct malicious acts inside organizations? What processes do they go through ...
Your CISO Wants an Insider Threat Program: How to Build One You Won't Hate Christine Leslie Face it, the very idea of setting up an insider threat program freaks you out! ...
Why Collaborative Enterprises Need a Better Way to Manage Risk Mark Juncker The rise of the digital collaborative enterprise has made data risk from insider threats unavoidable. ...
A Tinker, a Tailor, a Soldier, a Spy, a Cat, George Michael, and William Foster… Samantha Cassidy You might be thinking this is heading towards a bad joke about walking into a ...
Don't Trust Me....Please! Dr. Chase Cunningham As the pandemic fallout has created the perfect conditions for insider threat, organizations are assessing ...
New World, New Risks - Managing Insider Threat During COVID-19 Dr. Gelles The COVID-19 pandemic has given organizations an entirely new and unfamiliar set of risks to ...
When the Outsider Becomes the Insider Zeki Turedi In todays’ world ransomware is a growing threat where we often hear about organizations workforce ...
Your Data is Trying to Tell You a Story. Are You Listening? Jim Apger Threats to the enterprise are constantly morphing. Several recent trends involving collaboration/productivity tools, cloud services, ...
Fueling Success Through Diversity and Inclusion Dr. Ivan Joseph A culture of inclusivity is a culture of high performance. Teams and organizations that prioritize ...
Pirates & Nukes, Insider Nightmares Chris Kubecka Insider risks can have human consequences if not managed and mitigated effectively. Chris will share ...
What Happened? Learning From the Twitter Hack Chris Halabi In a statement describing their major hack, Twitter said “This attack relied on a significant ...
Enabling Insider Threat Detection at Machine Speed Kamil Imtiaz In today's climate, enterprises want to prevent attacks and protect their remote workforce, especially from ...
How User Data Provides Insights Into Insider Risk Darragh Delaney As employees work from home, ‘insider threats’ are evolving. Employees now have remote access to ...
Tales from the Insider Crypt: The Evolution of Insider Risk Maturity Mr. Peter Hadjigeorgiou There are two types of organizations in this world. One with no security maturity and ...
Zero Trust for Humans Sean Frazier How user experience is crucial for a successful Zero Trust journey.
Evolving Faster Than the Threat: How the DHS Approach to Insider Threat Can Apply to Your Program Sean Thrash As every security professional knows, today’s threat environment is constantly changing. Just as threats have ...
Insiders: An Attacker's Perspective Janel Weathers Join Janel Schalk, Global Executive Services Director, and Travis Weathers, Practice Director, who are co-authors ...
WFH Means WTF? SOC Managers Discuss Securing the Remote Workforce Michael Palmer No one could have predicted what the idea of "fast" and "change" would mean in ...
Securely Enabling Your New Dynamic Workforce Chris Niggel Join this session to learn: Zero trust is at the core of security (identity of ...
CISOs: The Road Ahead Jadee Hanson , Dawn Towers 2020 has given us a lot to think about... And it isn't even over yet! ...