DataConnectorsSanAntonio&Austin 2020 Oct. 8, 2020 to Oct. 8, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Surviving the Digital Storm – IoT Security Deluge Joel Hollenbeck We are on the verge of entering our 4th industrial revolution: the era of the ...
Reducing Friction and Managing Remote Work Environments Jay Goodman The business world has changed and many of those changes, like remote working, are here ...
Threat Hunting & Modern Security: 3 Fundamental Flaws Jim Rohde Security Operations is a discipline continuously evolving – with the evolution of tools and processes, ...
Moving Beyond Password to Delight & Secure Users Michael Patterson Passwords have been a constant throughout the internet era. As we’ve moved from desktops to ...
QA PANEL #1: Identity: the New Perimeter? Roman Medina , Duleep Wikramanayake , Eric Heflin , Robert Neill , Cecil Pineda , Chris White , Merritt Baer The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles ...
Developing Your Identity Strategy Rob Wilson Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, ...
Building Cyber Resilience: Finding Factors not Fault Mark Sangster Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ...
Keynote George Reeves The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the ...
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy David Huskisson Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ...
Managing Digital Risk Amid Disruption Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
QA PANEL #2: Defense in Depth (3rd Party Risk) Roman Medina , Duleep Wikramanayake , Eric Heflin , Robert Neill , Cecil Pineda , Chris White , Merritt Baer Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
Offensive AI vs. Defensive AI: Battle of the Algorithms David Masson Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ...
QA PANEL #3: WFH2020: Cybersecurity Surviving & Thriving Amid the Pandemic Roman Medina , Duleep Wikramanayake , Eric Heflin , Robert Neill , Cecil Pineda , Chris White , Merritt Baer We all went virtual this year… unexpectedly. As COVID-19 instantiates itself as the biggest force ...
Ransomware Recovery with Speed and Precision Eric Bodkin Ransomware attacks cause major business disruptions resulting in significant time expenditures, technical resources, and related ...
Understanding and Combating Credential Stuffing Attacks Chris Scott Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead ...