SecureWorldDetroit-Toronto-Cincinnati 2020 Oct. 8, 2020 to Oct. 8, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: The Resilient Enterprise: Securing the Virtual Workforce Adam Leisring Throughout the course of 2020, organizations have seen a transformational shift in the way that ...
Practical Considerations When Verifying Your Vendors' Cybersecurity Controls Arif Hameed As businesses grow, it becomes increasingly cheaper, more convenient, and more efficient to rely on ...
A Hitchhiker’s Guide to the 2020 National/Industry/Cloud Exposure Report (NICER) Bob Beardsley Rapid7 has built upon four years of work measuring the internet for National Exposure Index ...
Cybercrime: What Is the State of Support for Consumer and SMB Victims? Kristin Ellis How can you support your end users if they are a victim of cybercrime in ...
Panel: Data Threats in the Cloud Jonathan Nguyen-duy , Mitch Spaulding , Lisa Wallace We all know that COVID-19 has forced us into the cloud. We had to, to ...
Approaches to Justifying Cybersecurity Projects and Spend Michael Muha Feel like you’re not getting enough funding for your security projects or program? Learn to ...
Navigating Maze: Can You Recover from Ransomware? Kevin Dreyer One-fifth of companies have been hit with ransomware, and yet most companies still rely on ...
Being Our Own Worst Enemy: Sloppy IT Causing Security Incidents Ryan Mostiller IT and the IT Security Team have put in countless controls and tools to protect ...
Panel: Remote Workforce: Lessons Learned Chris Goettl , Christopher Hass , Sivan Tehila Companies had no real choice as we all moved to the “new normal” and a ...
The Changing Landscape of Cybercrime and Its Impact Kenrick Bagnall The average loss from a bank robbery is about $3,000. The average loss from a ...
Developing an Effective Security Awareness Program Tim O'connor Security Awareness is well known for being the “best bang for the buck” out of ...
Detect Everything: Bringing Google Scale Threat Detection to Your SOC Svetla Patnaik Skillful threat detection and investigation starts with a diverse hub of security telemetry to draw ...
Panel: No Perimeter: Security in the Cloud Mike Lloyd , Grant Asplund , William J. Malik , Ryan Archer , Chase Massar Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an ...
Security for, from, and with Machine Learning and Artificial Intelligence Technologies Joshua Cloud As companies look to increase their operational efficiencies and competitive advantage, many are turning to ...
The Paradigm Shift: HIPAA, PCI-DSS, Home, and Work Mitchell Brett Parker Much of the security training that we have put in place has assumed that the ...
How an XDR Approach Helps Speed Response and Improve MITRE ATT&CK Coverage Eric Skinner XDR is an emerging industry approach that extends EDR’s insight to a broad range of ...
Cybersecurity in Canada: The Evolution of Legal Trends & How to Respond Imran Ahmad As cybersecurity and privacy laws evolve, there is a growing need to stay abreast of ...
When Cyberattacks Get Physical Adel Danesh Advancements in technology, especially over the past decade, have resulted in a significant increase in ...
Hey, Information Security: Be Part of the Digital Transformation or Be Left Behind! Sandy Silk “Digital transformation” (Dx) as a buzzword may be approaching the end of its life, but ...
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready? James Goepel Supply chain risks are at the top of everyone’s mind today, and the US Department ...
Panel: Threat Landscape in Flux: Emerging Threats Matt Hubbard , Shane Harsch , Adam Gates The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ...
Closing Keynote: The New National Cyber Power Index: Which Nations Are Truly the Most Powerful in Cyber? Julia Voo Think you know which countries are the most powerful in the cyber realm? You may ...