CyberResilienceSummit 2020 Oct. 13, 2020 to Oct. 13, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynotes Peter Bauer , Christina Van Houten , Sandro Bucchianeri , Gerald Chertavian , Lindsay Jack , Paul Sowden , Darren Watts , Sebastien Degardin Co-founder and CEO Peter Bauer interviews Sandro Bucchianeri of Absa Group Limited to get at ...
The Mimecast Solution Framework Part 1 Lindsay Jack , Thom Bailey , Carla Van Rensburg , Steve Malone , Michael Madon , Max Linscott , Elad Schulman , Dirk Jan Koekkoek , Vp Dmarc Learn how Mimecast’s Email Security 3.0 strategy and the new Mimecast Solution Framework. You’ll learn ...
The Mimecast Solution Framework Part 2 David Staunton , Edwin Moreno , Thom Bailey , Carla Van Rensburg , Dan Sloshberg , Garth Landers , Kelley Kirby , Duane Nicol Continue the discussion of the Mimecast Solution Framework with details on our Resilience Extensions, including ...
Mimecast Intelligence Francis Gaffney , Kiri Addison , Thom Bailey , Josh Douglas Hear from Mimecast threat experts as they walk through the cyber challenges of the first ...
N/A Jules Martin , George Sentonas Mimecast Ecosystem and CrowdStrike’s George Kurtz, entrepreneur and Co-founder Mike Sentonas, CTO discuss sharing threat ...
The Power of Human Resilience & Mimecast’s Customer’s Vision Jetze Plat , Heather Bentley , Dino Dimarino Don’t miss this story of resilience from Jetze Plat, a Paralympian and world-class Dutch para-triathlete ...
Security’s New Normal: We’re Not Going Back, But Where are We Going? Scott Crawford Today's reality has further accelerated the move toward digital transformation and the cloud. The big ...
Closing gaps in Microsoft 365 - The benefits of cloud without increased security risk J. Peter Bruzzese There’s no question that Microsoft 365 is a great cloud-based email service, but you need ...
Time to play offense with your e-Discovery action plan Garth Landers Responding to e-Discovery events is often reactive and time-pressured. Learn how an integrated archive and ...
Web Threats & Shadow IT: Should you be afraid of what's lurking in the shadows? Jamie Rensburg Email may be the top attack vector, but cyber criminals wouldn’t be nearly as successful ...
The 1/10/60 minute challenge in a remote workforce environment: Responding to incidents within the “Breakout Time” window Jessica Alexander Join this session to hear API Alliance Partner, CrowdStrike, discuss their solution and integration with ...
Cracking the code with Mimecast Reports David Staunton , Pete Crowdell , Terri Parker As an IT professional, you know that the data, analytics, and reporting you receive are ...
Navigating the security challenges of a world turned upside down Jon Goodwin , Rhiannon Phelan , Nancy Haines New realities are creating fresh challenges for those tasked with keeping the Public Sector secure. ...
Email Security - We never stop protecting you Steve Malone Email remains the number one attack vector, and that means we never stop innovating, refining, ...
Trends and key takeaways from our current threat landscape Francis Gaffney How has the threat landscape changed during the pandemic and what tactics are being most ...
Security From the Inside Out - Keeping internal email, data, and employees safe Thom Malone Threats inside an organization are often underestimated, which means they also carry a lot of ...
Optimizing Your Security Ecosystem with Orchestration and Automation Lauren Montero As security teams continue to evolve, adapt, and innovate at a rapid rate, the struggle ...
Cloud Archive - Forecast bright and sunny Shane Harris Mimecast Cloud Archive serves as a GPS for your organization's data. Join this session to ...
Improving security for remote working: Key recommendations Matthew Coleman Many organizations are smack in the middle of a work from home trial by fire. ...
The Mimecast security black box Lindsay Jack Because of Mimecast’s cloud infrastructure, many of the techniques we use to protect your organization ...
Integrating Mimecast to level-up your security architecture Joe Tibbetts Transformers (Robots in Disguise) are powerful on their own; but when they come together, they ...
Putting the intelligence into Threat Intelligence Josh Toshack Mimecast Threat Intelligence is focused on predicting bad behavior before it happens. Join this session ...
Don't let your brand be used as bait Max Schulman Without ever confronting an organization’s email perimeter, it’s easy for cybercriminals to impersonate a brand ...
Palo Alto Networks and Mimecast – Better together Neelima Rustagi Join this session to hear API Alliance Partner, Palo Alto Networks, discuss their solution and ...
Email protection and recovery for remote workers: Is your plan good enough? Garth Gilmartin As work from home has become the new reality, attacks volumes are going up, the ...
Innovating in a Time of Disruption with Apple Co-founder Steve Wozniak and Mimecast’s Co-founder & CEO Peter Bauer Steve Bauer Steve Wozniak, cult-icon and co-founder of Apple, will spend time with Peter Bauer, CEO of ...