CyberSecuritySummitSiliconValley 2020 Nov. 10, 2020 to Nov. 10, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security Keynote: Faking It - Combatting Email Impersonation with AI Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Presentation: Talking to the Board About the New Realities of IT Security Jeff Costlow With the sudden shift of the global workforce from in-office to remote, IT teams quickly ...
Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Nathan Wenzler , Jason Dablow , Dan Bearl , Abdel Sy Fane Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Presentation: The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Presentation: Navigating Complexity: A Path Through Too Much Choice Dr. mike Lloyd We’re all trying to protect constantly changing network environments without enough people, and with too ...
Shifting Privilege Access Management (PAM) into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (ZSP) was a new term introduced in 2019 and might just be ...
Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance Christopher Smith Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Brian Robison , Matthew Gardiner , Andrew Miller , Kelly Shortridge , Nick Yokum , Sai Chavali , Ray Espinoza According to a recent survey, last year 69% of organizations suffered a data breach caused ...
Presentation: Securing Remote Workers with Google and Chrome Enterprise Loren Hudziak With the proliferation of COVID-19 across the globe, the need for a remote working strategy ...
Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next Sudhakar Ramakrishna The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ...
Presentation: Application Security as the Business Transforms Brian Anderson As transformations continue at breakneck speeds, how are these changes impacting security? Specifically, applications are ...
Presentation: Security by Design: A Crucial Part of Digital Transformation You're Probably Overlooking Trent Bond Many businesses are fundamentally changing the way they operate thanks to new, exciting technology that ...
Security Keynote with the U.S. Department of Homeland Security Joe Oregon N/A