Title |
Speakers |
Summary |
Topic Types |
Cyber Security Summit Exclusive Keynote Presentation: "Looking through the Eyes of the Cyber Attacker" Presented by The NSA |
Quinn Carman
|
Prior to defending an organization against a determined attacker, their techniques must be understood. This ... |
|
Security Keynote with Darktrace: Faking It - Combatting Email Impersonation with AI |
Dan Fein
|
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, ... |
|
Cyber-Espionage Report - Out of the Shadows. Into the Digital Crosshairs |
David Grady
|
If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 ... |
|
Continuous Vulnerability Management – Striving for a 14-Day SLA |
Chris Goettl
|
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... |
|
The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next |
Sudhakar Ramakrishna
|
The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses ... |
|
Panel 1: Security Orchestration & Automation and How it Relates to the Workforce & Retention |
Dave Lewis
,
Nathan Wenzler
,
Kevin Kennedy
,
Ron Bennatan
,
Harish Sekar
,
Torsten Larson
,
Stuart Winter-tear
|
Security teams today are being overwhelmed by the massive amounts of data collected by their ... |
|
The Path to Security Effectiveness |
Sam Mclane
|
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation ... |
|
The Future of Cybersecurity – AI vs AI |
Nayeem Islam
|
The rate of change information technology and security experienced over the past few months has ... |
|
Get Rich Quick with Ransomware: A Lazy Hacker's Perspective for Enterprises |
Gil Azrielant
|
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, ... |
|
The California Privacy Rights Act - What it is, Why it is Significant, and How to Prepare |
Scott Giordano
|
N/A |
|
Open Security – from Patchwork to Platform |
Patrick Vowles
|
As organization adopt new technologies and utilize the cloud for business innovation and growth, security ... |
|
Zero Trust Principles with Internet Isolation |
James Locus
|
N/A |
|
Panel 2: Insider Threat - How to Detect Malicious Attacks and Defend Your Organization from the Human Error |
Chris Pittman
,
Torsten George
,
Jeff Schwartz
,
Renee Tarun
,
Kim Berry
,
Spencer Lichtenstein
,
Dan Clark
|
According to a recent survey, last year 69% of organizations suffered a data breach caused ... |
|
Cyber Risk Exchange: Mastering a New Approach to Vendor Risk Management & Compliance |
Christopher Smith
|
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, ... |
|
Securing Remote Workers with Google and Chrome Enterprise |
Loren Hudziak
|
With the proliferation of COVID-19 across the globe, the need for a remote working strategy ... |
|
Closing Security Keynote with the U.S. Department of Homeland Security |
Rich Richard Jr.
|
N/A |
|