VirtualCyberSecurity&FraudSummit 2020 Sept. 22, 2020 to Sept. 22, 2020, Toronto, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Fraud Fusion in the COVID-19 Era Jeff Dant Five years ago, Jeff Dant made a career move from the U.S. Secret Service to ...
CISO Panel: Cybersecurity After COVID-19 Olivera Chand As businesses and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs ...
Defending Your APIs Against Industrialized Cybercrime Ameya Talwalkar With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to ...
Security Transformed Avi Rembaum Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT ...
Maximizing Cyber Investments During Times of Uncertainty Yaz Alattia Everything has changed. Organizations have quickly pivoted towards the "new norm", adopting new practices and ...
How to Think Like a Cybercriminal (so you can outsmart them) Ryan Poppa How well do you really know your environment, your security practices and policies? Do you ...
Moving Left of Breach - The Human-Centric Cyber Path Forward Myrna Soto When attackers have a 95% success rate, it's not a matter of if but when ...
Smarter Threat Management with Machine Learning and Artificial Intelligence George Nastasi Threats continue to evolve in complexity at unprecedented rates, making it a challenge to identify ...
Faking It - How Cyber AI can Combat Digital Fakes Dan Fein Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, ...
Unlocking Effective Threat Detection Samer Faour Outdated threat hunting procedures hold your security program back - both in the time it ...
Tech Spotlight: Security Operations In This New Paradigm Renee Tarun With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT ...
2021: The Cybersecurity Legal and Compliance Outlook Imran Ahmad , Robin Promislow At the start of 2020, the legal and compliance communities were focused on the enactment ...
Redefining Mobile Security (and Why it Works) Mike Burr Google's Android is the most popular mobile operating system in the world, powering over 2.5 ...
The Shifting Frontline of Fraud: Coordinating across IT, Security, and Fraud Teams Rob Roj This year's wholesale shift to online channels has not gone unnoticed by cybercriminals. Today fraudsters ...
Understanding Open Source Risk Brittany O'shea The data speaks for itself. In our analysis of over 85,000 applications, more than 500,000 ...
Simplifying Cloud Security and Encryption in a Multi-Cloud Environment Sol Cates As businesses accelerate their migration of core processes and data to the cloud, security remains ...
Zero Trust Access: The Five Step Program Dave Lewis The perimeter-based security approach of the last century is no longer adequate for securing the ...
2020 Network and Application Threat Landscape Pascal Geenens Lessons learned from the past will help us secure the future. As the world is ...
Managing Dynamic Workforce Risk in Times of Disruption Ben Smith You rapidly upgraded your infrastructure and systems to support the largest teleworking experiment in history. ...
Financial Services and The New Tomorrow Martyn Crew As the dust settles on the immediate impact of Covid-19, many financial services companies are ...
The Impact of COVID-19 on Fraud Gord Jamieson Fraudsters remain active during the pandemic and have increased the volume and sophistication of social ...