DataConnectorsCincinnati 2020 Nov. 5, 2020 to Nov. 5, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Proactive Endpoint Protection: What it Is and What it Is Not | Samuel Osterhout | Breach damage caused by hackers has accelerated in 2020 despite the fact that businesses are ... | |
Surviving the Digital Storm – IoT Security Deluge | Joel Hollenbeck | We are on the verge of entering our 4th industrial revolution: the era of the ... | |
Managing Digital Risk Amid Disruption | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
The Evolution of Ransomware: | Kris Wayman | One constant truth Sophos has found over our 30 years of creating effective defenses against ... | |
Automate or Die Trying: The New Cybersecurity Reality | Ryan Smith | As the nature of threats continue to evolve as well as the volume of threats ... | |
Panel #1: Ransomware Ex Post Facto: Coming Back After an Attack | Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp | Whether you chose to pay the ransomware or not, industry experts tell you to treat ... | |
Reducing Friction and Managing Remote Work Environments | Jay Goodman | The business world has changed and many of those changes, like remote working, are here ... | |
The Rise of Secure Access Service Edge (SASE) | Jacob Serpa | Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different ... | |
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy | David Huskisson | Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ... | |
Keynote: Cyber-Security: A Case for Information Sharing | Chris Stoddard | Most organizations can not possibly answer, respond or address every cyber threat that presents itself. ... | |
Building Cyber Resilience: Finding Factors not Fault | Mark Sangster | Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ... | |
SCHOOL’S IN SESSION: How One University Automated the Sensitive Data Discovery Process to Increase Data Security & Streamline Data Governance | Rick Wilson | Like many organizations, Point Park University (PPU) — a private liberal arts university located in ... | |
Panel #2: IoT – Security at the Edge | Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp | The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected ... | |
CyberSecurity Ratings: Market Forces and Future Considerations | David Ortiz | In this session, David will examine the most prevalent issues that attribute to third party ... | |
Changing Cyber Landscapes: The Battle of Algorithms | David Masson | Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ... | |
Panel #3: IAM + WFH: Changing face of Identity in a WFH World | Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp | By now, we’re tired of talking about how everyone had to do a rush job ... | |
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices | Jeff Horne | For many years now, enterprise networks have seen an explosive rise in devices that are ... | |
Understanding and Combating Credential Stuffing Attacks | Chris Scott | Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead ... |