DataConnectorsBaltimoreTech-Security 2020 Sept. 30, 2020 to Sept. 30, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CISO Panel Daniel J. Walsh , Dr. Chandana Unnithan , Dasha Deckwerth , Michael S Gardner , Karina Fernandez , Marcia Main N/A
Don’t get Phished! See How IRONSCALES Self-Learning Email Security Platform Stops Tomorrow’s Phishing Attacks Today! Brian Cesca Cyber Criminals don’t care. From holiday seasons, elections, tax-day or our current pandemic COVID-19. They’re ...
Managing Digital Risk Amid Disruption Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
The Passwordless Experience Rajan Barara As long as we’ve had computers, people have been able to steal our passwords. Join ...
Developing Your Identity Strategy Rob Wilson Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, ...
Reducing Friction and Managing Remote Work Environments Richard Melick The business world has changed and many of those changes, like remote working, are here ...
Identity: the New Perimeter? N/a The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
Continuous Vulnerability Management: Striving for a 14 Day SLA Chris Goettl The importance of having a continuous vulnerability management process as part of an overall security ...
Keynote: Resilience Matters: Cyber Threat Landscape and CISA Cybersecurity Resources Available for Building Operational Resilience Benjamin Gilbert When it comes to cyber-attacks, It’s not a matter of if. It’s no longer even ...
Stopping Attacker Movement Before They Reach Your Crown Jewels Wade Lance During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use ...
Ramping up with FedRAMP – Best practices using real-world examples for your compliance projects Cynthia Burke So many acronyms such little time – FISMA, FedRAMP, OBM, 3PAO – you may have ...
Users as the Attack Vector – People and Security N/a Users, those carbon-based life forms usually roaming the halls of your buildings, are the last ...
A new Spin on Securing Active Directory Tom Atkins CISOs, Penetration Testers, and Incident Responders all agree that Active Directory is a primary target ...
A People-Centric Approach to Cyber Risk Management Jack Johnson Today’s threat landscape is characterized by attacks which focus on humans. For the third straight ...
Defense in Depth (3rd Party Risk) N/a Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as ...
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps Michael Sullivan It’s the day IT leaders dread — Ransomware has taken control of your entire network. ...