DataConnectorsJacksonville 2020 Oct. 22, 2020 to Oct. 22, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The IoT storm … Will we survive the coming deluge? Robert Falzon IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ...
The Evolution of Ransomware: Kris Wayman One constant truth Sophos has found over our 30 years of creating effective defenses against ...
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises Gil Azrielant Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, ...
Automate or Die Trying: The New Cybersecurity Reality Ryan Smith As the nature of threats continue to evolve as well as the volume of threats ...
Panel 1: Defense-in-Depth: 3rd Party Risk Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as ...
Building Cyber Resilience: Finding Factors not Fault Mark Sangster Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ...
Lessons Learned from Real-life Ransomware Remediation Projects Kellen Christensen Ransomware has organizations of all sizes and across all industries concerned that they may be ...
Keynote: Defending our Nation’s Critical Infrastructure in a time of Crisis Klint Walker Klint will discuss the linkages between cyberspace and physical systems and best practices for reducing ...
SecurityScorecard – CyberSecurity Ratings: Market Forces and Future Considerations David Ortiz In this session, David will examine the most prevalent issues that attribute to third party ...
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps Michael Sullivan It’s the day IT leaders dread — Ransomware has taken control of your entire network. ...
Panel 2: Managing all Types of Risk in Today’s Cybersecurity Landscape Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau Risk comes from all angles in 2020 users, vendors, partners, systems. In this panel, we ...
Understanding and Combating Credential Stuffing Attacks Chris Scott Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead ...
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy David Huskisson Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ...
Panel 3: Election Security Carlos Garcia , Dr. Chandana Unnithan , Dasha Deckwerth , Perla Grau In case you have missed it, we’re in an election year. The storied 2016 DNC ...
Introduction to Proactive Prevention Netta Schmeidler Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed ...