DataConnectorsJacksonville 2020 Oct. 22, 2020 to Oct. 22, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The IoT storm … Will we survive the coming deluge? | Robert Falzon | IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ... | |
The Evolution of Ransomware: | Kris Wayman | One constant truth Sophos has found over our 30 years of creating effective defenses against ... | |
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises | Gil Azrielant | Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, ... | |
Automate or Die Trying: The New Cybersecurity Reality | Ryan Smith | As the nature of threats continue to evolve as well as the volume of threats ... | |
Panel 1: Defense-in-Depth: 3rd Party Risk | Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau | Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as ... | |
Building Cyber Resilience: Finding Factors not Fault | Mark Sangster | Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ... | |
Lessons Learned from Real-life Ransomware Remediation Projects | Kellen Christensen | Ransomware has organizations of all sizes and across all industries concerned that they may be ... | |
Keynote: Defending our Nation’s Critical Infrastructure in a time of Crisis | Klint Walker | Klint will discuss the linkages between cyberspace and physical systems and best practices for reducing ... | |
SecurityScorecard – CyberSecurity Ratings: Market Forces and Future Considerations | David Ortiz | In this session, David will examine the most prevalent issues that attribute to third party ... | |
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps | Michael Sullivan | It’s the day IT leaders dread — Ransomware has taken control of your entire network. ... | |
Panel 2: Managing all Types of Risk in Today’s Cybersecurity Landscape | Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau | Risk comes from all angles in 2020 users, vendors, partners, systems. In this panel, we ... | |
Understanding and Combating Credential Stuffing Attacks | Chris Scott | Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead ... | |
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy | David Huskisson | Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ... | |
Panel 3: Election Security | Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau | In case you have missed it, we’re in an election year. The storied 2016 DNC ... | |
Introduction to Proactive Prevention | Netta Schmeidler | Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed ... |