CyberSecuritySummitSiliconValley 2020 Nov. 10, 2020 to Nov. 10, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Security Keynote: Faking It - Combatting Email Impersonation with AI | Dan Fein | Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... | |
Presentation: Talking to the Board About the New Realities of IT Security | Jeff Costlow | With the sudden shift of the global workforce from in-office to remote, IT teams quickly ... | |
Presentation: Continuous Vulnerability Management – Striving for a 14-Day SLA | Chris Goettl | When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... | |
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention | Nathan Wenzler , Jason Dablow , Dan Bearl , Abdel Sy Fane | Security teams today are being overwhelmed by the massive amounts of data collected by their ... | |
Presentation: The Path to Security Effectiveness | Sam Mclane | It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... | |
Presentation: Navigating Complexity: A Path Through Too Much Choice | Dr. mike Lloyd | We’re all trying to protect constantly changing network environments without enough people, and with too ... | |
Shifting Privilege Access Management (PAM) into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (ZSP) was a new term introduced in 2019 and might just be ... | |
Presentation: Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance | Christopher Smith | Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ... | |
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error | Brian Robison , Matthew Gardiner , Andrew Miller , Kelly Shortridge , Nick Yokum , Sai Chavali , Ray Espinoza | According to a recent survey, last year 69% of organizations suffered a data breach caused ... | |
Presentation: Securing Remote Workers with Google and Chrome Enterprise | Loren Hudziak | With the proliferation of COVID-19 across the globe, the need for a remote working strategy ... | |
Presentation: The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next | Sudhakar Ramakrishna | The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ... | |
Presentation: Application Security as the Business Transforms | Brian Anderson | As transformations continue at breakneck speeds, how are these changes impacting security? Specifically, applications are ... | |
Presentation: Security by Design: A Crucial Part of Digital Transformation You're Probably Overlooking | Trent Bond | Many businesses are fundamentally changing the way they operate thanks to new, exciting technology that ... | |
Security Keynote with the U.S. Department of Homeland Security | Joe Oregon | N/A |