Title |
Speakers |
Summary |
Topic Types |
Security Keynote with Darktrace: Faking It - Combatting Email Impersonation with AI |
Dan Fein
|
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... |
|
Verizon Presentation: Security by the Numbers: Insights from Verizon’s Recent Research |
David Grady
|
If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ... |
|
Check Point Software Technologies: Cyber CEO - Understanding Strategic Convergence of Business & Technology Collaboration |
Eddie Doyle
|
Today’s CEO needs a weekly cyber briefing, but not about technology, about risk. Moreover, the ... |
|
Ivanti Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA |
Chris Goettl
|
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... |
|
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention |
Nathan Wenzler
,
Alex Flores
,
Sean Frazier
,
Chris Pittman
|
Security teams today are being overwhelmed by the massive amounts of data collected by their ... |
|
IDMWORKS & Sailpoint Presentation: The Expanding Identity Universe |
Gray Mitchell
|
Identity and Access Management (IAM) advancements are heavily influenced by technology trends in the broader ... |
|
Remediant Inc. Presentation: Shifting Privilege Access Management (PAM) into High Gear with Zero Standing Privilege (ZSP) |
Paul Lanzi
|
Zero Standing Privilege (ZSP) was a new term introduced in 2019 and might just be ... |
|
Arctic Wolf Presentation: The Path to Security Effectiveness |
Sam Mclane
|
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... |
|
TruGrid Presentation: Fixing VPN Flaws with Zero Trust Remote Access |
Peter Ayedun
|
N/A |
|
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error |
Luis Rodriguez
,
Michael Crouse
,
Nick Yokum
,
Joel Hollenbeck
,
Ben Mungkornpanich
|
According to a recent survey, last year 69% of organizations suffered a data breach caused ... |
|
Spirion Presentation: The California Privacy Rights Act - What it is, Why it is Significant, and How to Prepare |
Scott Giordano
|
N/A |
|
Closing Security Keynote with the U.S. Department of Homeland Security |
George Reeves
|
N/A |
|