CyberSecuritySummitSeattle 2020 Oct. 9, 2020 to Oct. 9, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Keynote with Darktrace: Faking It - Combatting Email Impersonation with AI Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Security by the Numbers: Insights from Verizon’s Recent Research David Grady If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ...
Talking to the Board About the New Realities of IT Security Jeff Costlow With the sudden shift of the global workforce from in-office to remote, IT teams quickly ...
The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Nathan Wenzler , Joseph Carson , Greg Pepper , Chris Pittman , Isaac Hannagan , Torsten Larson Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Navigating Complexity: A Path Through Too Much Choice Dr. mike Lloyd We’re all trying to protect constantly changing network environments without enough people, and with too ...
Transparent Security to Enable End User Happiness Brian Deitch End users are known to be one of the top insider threats to an organization. ...
Open Security – from Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Tony Pepper , Matthew Gardiner , Brad Beutlich , Chris Stouff , Kim Berry , David Rudd According to a recent survey, last year 69% of organizations suffered a data breach caused ...
Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance Christopher Smith Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ...
Cybercrime Tactics & Techniques 2020 Adam Gates The coronavirus pandemic has left the world looking very different at the end of the ...
The California Privacy Rights Act - What it is, Why it is Significant, and How to Prepare Scott Giordano N/A
The Evolution of Customer Identity and Access Management Gray Mitchell N/A
Closing Security Keynote with the U.S. Department of Homeland Security Ronald Watters N/A