CyberSecuritySummitNewYork 2020 Nov. 20, 2020 to Nov. 20, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cyber Security Summit Exclusive Keynote Presentation: "Looking through the Eyes of the Cyber Attacker" Presented by The NSA Quinn Carman Prior to defending an organization against a determined attacker, their techniques must be understood. This ...
Security Keynote with Darktrace: Faking It - Combatting Email Impersonation with AI Dan Fein Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ...
Cyber-Espionage Report - Out of the Shadows. Into the Digital Crosshairs David Grady If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ...
Continuous Vulnerability Management – Striving for a 14-Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next Sudhakar Ramakrishna The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ...
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention Dave Lewis , Nathan Wenzler , Kevin Kennedy , Ron Bennatan , Harish Sekar , Torsten Larson , Stuart Winter-tear Security teams today are being overwhelmed by the massive amounts of data collected by their ...
The Path to Security Effectiveness Sam Mclane It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ...
The Future of Cybersecurity – AI vs AI Nayeem Islam The rate of change information technology and security experienced over the past few months has ...
Get Rich Quick with Ransomware: A Lazy Hacker's Perspective for Enterprises Gil Azrielant Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, ...
The California Privacy Rights Act - What it is, Why it is Significant, and How to Prepare Scott Giordano N/A
Open Security – from Patchwork to Platform Patrick Vowles As organization adopt new technologies and utilize the cloud for business innovation and growth, security ...
Zero Trust Principles with Internet Isolation James Locus N/A
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error Chris Pittman , Torsten George , Jeff Schwartz , Renee Tarun , Kim Berry , Spencer Lichtenstein , Dan Clark According to a recent survey, last year 69% of organizations suffered a data breach caused ...
Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance Christopher Smith Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ...
Securing Remote Workers with Google and Chrome Enterprise Loren Hudziak With the proliferation of COVID-19 across the globe, the need for a remote working strategy ...
Closing Security Keynote with the U.S. Department of Homeland Security Rich Richard Jr. N/A