CyberSecuritySummitBoston 2020 Nov. 5, 2020 to Nov. 5, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Security by the Numbers: Insights from Verizon’s Recent Research David Grady If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ...
Faking It - Combatting Email Impersonation with AI Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Talking to the Board About the New Realities of IT Security Jeff Costlow With the sudden shift of the global workforce from in-office to remote, IT teams quickly ...
The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Nathan Wenzler , Joseph Carson , Chris Pittman , Somer Hernandez , Ron Bennatan , David Rudd Security teams today are being overwhelmed by the massive amounts of data collected by their ...
Continuous Vulnerability Management – Striving for a 14-Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Shifting Privilege Access Management (PAM) into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (ZSP) was a new term introduced in 2019 and might just be ...
Securing Remote Workers with Google and Chrome Enterprise Loren Hudziak With the proliferation of COVID-19 across the globe, the need for a remote working strategy ...
Zero Trust: Insider Risk Tommy Todd Many organizations today are engaging in Zero-Trust (ZT), but are ignoring the value of the ...
Zero Trust Principles with Internet Isolation James Locus N/A
Endpoint Management – Are they even coming back to the office? Axel Peters This year changed the way of life for IT Administrators in many ways and endpoint ...
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Ben Smith , Matthew Gardiner , J. Wolfgang Goerlich , Mark Ostrowski , Renee Tarun , David Telehowski According to a recent survey, last year 69% of organizations suffered a data breach caused ...
Open Security – from Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
DLP Has Evolved – Have You? Fahim Afghan Legacy DLP technologies have failed you. They are unable to cater to the way people ...
2020 - The Passwordless Decade George Avetisov As we enter the passwordless decade, more and more organizations are asking the question: How ...
Closing Security Keynote Ron Ford N/A