DataConnectorsCincinnati 2020 Nov. 5, 2020 to Nov. 5, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Proactive Endpoint Protection: What it Is and What it Is Not Samuel Osterhout Breach damage caused by hackers has accelerated in 2020 despite the fact that businesses are ...
Surviving the Digital Storm – IoT Security Deluge Joel Hollenbeck We are on the verge of entering our 4th industrial revolution: the era of the ...
Managing Digital Risk Amid Disruption Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
The Evolution of Ransomware: Kris Wayman One constant truth Sophos has found over our 30 years of creating effective defenses against ...
Automate or Die Trying: The New Cybersecurity Reality Ryan Smith As the nature of threats continue to evolve as well as the volume of threats ...
Panel #1: Ransomware Ex Post Facto: Coming Back After an Attack Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp Whether you chose to pay the ransomware or not, industry experts tell you to treat ...
Reducing Friction and Managing Remote Work Environments Jay Goodman The business world has changed and many of those changes, like remote working, are here ...
The Rise of Secure Access Service Edge (SASE) Jacob Serpa Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different ...
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy David Huskisson Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ...
Keynote: Cyber-Security: A Case for Information Sharing Chris Stoddard Most organizations can not possibly answer, respond or address every cyber threat that presents itself. ...
Building Cyber Resilience: Finding Factors not Fault Mark Sangster Given an outcome, we often exaggerate our ability to predict and therefore avoid the same ...
SCHOOL’S IN SESSION: How One University Automated the Sensitive Data Discovery Process to Increase Data Security & Streamline Data Governance Rick Wilson Like many organizations, Point Park University (PPU) — a private liberal arts university located in ...
Panel #2: IoT – Security at the Edge Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected ...
CyberSecurity Ratings: Market Forces and Future Considerations David Ortiz In this session, David will examine the most prevalent issues that attribute to third party ...
Changing Cyber Landscapes: The Battle of Algorithms David Masson Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ...
Panel #3: IAM + WFH: Changing face of Identity in a WFH World Dr. Michael Chahino , Brian Shea , Mark Houpt , Oliver Fischer-samano , Dean Crutchfield , Naomi Buckwalter , Robert Kemp By now, we’re tired of talking about how everyone had to do a rush job ...
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices Jeff Horne For many years now, enterprise networks have seen an explosive rise in devices that are ...
Understanding and Combating Credential Stuffing Attacks Chris Scott Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead ...