Title |
Speakers |
Summary |
Topic Types |
Security Keynote with Verizon: Security by the Numbers: Insights from Verizon’s Recent Research |
David Grady
|
If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ... |
|
Darktrace Presentation: Faking It - Combatting Email Impersonation with AI |
Dan Fein
|
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... |
|
ExtraHop Presentation: Talking to the Board About the New Realities of IT Security |
Jeff Costlow
|
With the sudden shift of the global workforce from in-office to remote, IT teams quickly ... |
|
Egress Presentation: DLP Has Evolved – Have You? |
Fahim Afghan
|
Legacy DLP technologies have failed you. They are unable to cater to the way people ... |
|
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention |
Ben Smith
,
Nathan Wenzler
,
Brian Vecci
,
Miles Martin
,
Corwin Burton
,
Jonathan Feibus
|
Security teams today are being overwhelmed by the massive amounts of data collected by their ... |
|
Check Point Software Technologies Presentation: The Number One Challenge In The Digital Transformation to the Cloud - You |
Grant Asplund
|
Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the ... |
|
Arctic Wolf Presentation: The Path to Security Effectiveness |
Sam Mclane
|
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... |
|
Ivanti Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA |
Chris Goettl
|
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... |
|
ThreatModeler Software, Inc Presentation: Secure Your Cloud Journey Through Automation |
Stuart Winter-tear
|
The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code ... |
|
OneTrust Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance |
Christopher Smith
|
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ... |
|
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error |
Matthew Gardiner
,
Michael Crouse
,
Chris Pittman
,
Nick Yokum
,
Ron Bennatan
,
Sai Chavali
,
Steve Litras
|
According to a recent survey, last year 69% of organizations suffered a data breach caused ... |
|
IBM Security Presentation: Open Security – from Patchwork to Platform |
Patrick Vowles
|
As organization adopt new technologies and utilize the cloud for business innovation and growth, security ... |
|
Closing Security Keynote with the U.S. Department of Homeland Security |
Benjamin Gilbert
|
N/A |
|