VirtualCybersecurity&FraudSummit 2020 Nov. 17, 2020 to Nov. 17, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The Future of Leadership | Alissa Abdullah | She was the Deputy CIO for the White House, and now she is SVP and ... | |
The Billion Dollar Security Blanket | Matt Ashburn | Global spending on cybersecurity is approaching $200 billion per year with no upper limit in ... | |
Reducing Your Data Attack Surface | Kelvin Coleman , Fredrik Forslund , General Gregory Touhill | You've deployed your largest-ever remote workforce and - with your employees' myriad of endpoint devices ... | |
Insider Threat: How to Mitigate the Heightened Risk | Randy Trzeciak | A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider ... | |
Proofing Digital Identity with Continuous Authentication & Behavioral Biometrics | Dr Shane Shook | As we approach 2021, the global pandemic brings a laser-focus to both risk and user ... | |
2021: The CISO's Odyssey | Bobby Ford | As global CISO of one of the world's oldest and largest consumer goods enterprises, Bobby ... | |
CISO's Perspective: Adapt and Secure | Mike Huckaby , Tomas Maldonado , Timothy Rohrbaugh | 2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the ... | |
The Legal Outlook: Incident Response, Ransomware and CCPA | Randy Sabett , Kristin Judge , Sadia Mirza | At the start of 2020, the legal and compliance communities were focused on the enactment ... | |
DevSecOps: Rethinking Cybersecurity for the 21st Century | Ron Ross | NIST fellow Ron Ross has long been affiliated with risk management and frameworks in support ... | |
Redefining Mobile Security (and Why it Works) | Mike Burr | Google's Android is the most popular mobile operating system in the world, powering over 2.5 ... | |
Secure Digital Identity in the Age of Coronavirus | Jeremy Grant | Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the ... |