CISOVirtualExecutiveSummit 2020 Nov. 18, 2020 to Nov. 18, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The Convergence of Zero Trust and SASE | Jason Wilcox | Organizations are feeling a shift in the world of networking and security as they rapidly ... | |
Leveraging Automation to Keep Pace with Threats | Kevin Hanes , Scott Moser , Sonja Hammond | Automation in the world of information security allows teams to move swiftly in the face ... | |
Metrics that Matter: Confidence and Resilience in Your Security Program | John Burger , Jeff Kirby , Mike Priest | CISOs say that what they need most in their security program is confidence that people, ... | |
What Makes a Next-Gen SOC? | George Finney , Patrick Benoit , Bruce Hembree | Security Operations Centers are often characterized by chaos. The volume and sophistication of security attacks ... | |
Data Governance as a Business Enabler | Mustapha Kebbeh , Sailaja Kotra-turner , Stéphane Charbonneau | Some organizations lack resources to help them track and govern their data at scale. With ... | |
Bringing Cloud Back Down to Earth | Elia Zaitsev , David Bell , Jessica Nemmers | CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, ... | |
Tomorrow’s Cyberthreats – Staying One Step Ahead | Israel Barak , Shamoun Siddiqui , Michael Simmons | At a time when customer trust is paramount and private data is precious, a major ... | |
Navigating the Application and Network Threat Landscape | Vivek Patel , Royce Holden | Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise ... | |
Emerging Technologies – Embracing Change | Robert Pace , Christopher Sicard | Innovative technologies can open the door to new solutions that can transform your business. However, ... | |
Cloud IAM – Enlightenment or Inferno | Kc Condit , Peter Scott , Aaron Munoz | A strong IAM is one key to preventing data breaches and limiting the blast radius, ... | |
The Changing Face of Insider Threat | Michael Anderson , Stephen Moore | As an organizational capability, insider threat management is changing - again. Firstly, the idea of ... | |
Protecting People, the New Perimeter | Lucia Milica , Sujeet Bambawale , Gary Toretti | As 2020 changes the way we live and work, cyber criminals are adapting as well. ... | |
The Art of Giving Back | Jeff Kirby | An informal and interactive opportunity for you to network with peers in small groups and ... |