CyberSecuritySummit 2020 Sept. 23, 2020 to Sept. 23, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Keynote with Verizon: Security by the Numbers: Insights from Verizon’s Recent Research David Grady If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ...
Darktrace Presentation: Faking It - Combatting Email Impersonation with AI Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
ExtraHop Presentation: Talking to the Board About the New Realities of IT Security Jeff Costlow With the sudden shift of the global workforce from in-office to remote, IT teams quickly ...
Egress Presentation: DLP Has Evolved – Have You? Fahim Afghan Legacy DLP technologies have failed you. They are unable to cater to the way people ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Ben Smith , Nathan Wenzler , Brian Vecci , Miles Martin , Corwin Burton , Jonathan Feibus Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Check Point Software Technologies Presentation: The Number One Challenge In The Digital Transformation to the Cloud - You Grant Asplund Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the ...
Arctic Wolf Presentation: The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Ivanti Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
ThreatModeler Software, Inc Presentation: Secure Your Cloud Journey Through Automation Stuart Winter-tear The move to cloud poses unique challenges as organizations adapt to securing infrastructure as code ...
OneTrust Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance Christopher Smith Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Matthew Gardiner , Michael Crouse , Chris Pittman , Nick Yokum , Ron Bennatan , Sai Chavali , Steve Litras According to a recent survey, last year 69% of organizations suffered a data breach caused ...
IBM Security Presentation: Open Security – from Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
Closing Security Keynote with the U.S. Department of Homeland Security Benjamin Gilbert N/A