SecureWorldWestCoast 2020 Dec. 9, 2020 to Dec. 9, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: Chaos Creates Opportunity: Security as a Business Enabler Jimmy Sanders Welcome to the new normal. Many, including me, praised the ideas of Rugged DevOps, Zero ...
“Machine Identity Management” and How It Secures Our Digital Transformation Journeys Michael Thelander Nothing has been more disruptive to the landscape of the financial services industry than digital ...
Business Continuity Planning During the COVID-19 Pandemic Milinda Hanson Susan and Milinda are Provation COVID-19 Task Force members leading their organization through these challenging ...
How an XDR Approach Helps Speed Response and Improve MITRE ATT&CK Coverage Eric Skinner XDR is an emerging industry approach that extends EDR’s insight to a broad range of ...
Panel: Threat Landscape in Flux: Emerging Threats Brian Robison , Israel Barak , Jonathan Echavarria , William J. Malik , Brad Beutlich The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ...
Connected Devices Need Connected Teams Lisa Tuttle IoT security is a growing concern as the number of connected devices increases. California, Oregon, ...
Panel: No Perimeter: Security in the Cloud Mike Lloyd , Eric Wolff , Zuri Cortez , Peter Klimek , Keith Buswell Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an ...
If Cryptography Is So Important, Why Is It So Misunderstood? Brad Beutlich Data encryption, Digital Signatures/Certificates, Application Encryption, and PKI are all technologies that use CRYPTOGRAPHIC functions, ...
How SASE Is Solving Today's Remote Worker Challenges Jason Georgi In this session, you’ll hear about how Prisma Access SASE is securely enabling the remote ...
Keynote: The Zero Trust You Don’t Know Kevin Bocek Think you know Zero Trust? You might have just half the story. In the new ...
Approaches to Justifying Cybersecurity Projects and Spend Michael Muha Feel like you’re not getting enough funding for your security projects or program? Learn to ...
Extortionware: Your Privacy Problems Made Public Lonnie Benavides Over the last decade, ransomware has increasingly become the most popular option for hackers to ...
Managed Detection and Response (MDR): 5 Essential Questions to Ask Your Vendor Mark Sangster As sophisticated threat actors like state-sponsored and organized crime gangs use ever harder to detect ...
Panel: Remote Workforce: Lessons Learned David Hawkins , Christopher Hass , Sivan Tehila , Jason Georgi , Alex Sorokunov Companies had no real choice as we all moved to the “new normal” and a ...
Cloud Encryption Dynamics Paul Rich The emergence of cloud computing resulted in a boom in attention on encryption. Where has ...
Third Party Risk Management: Tips to Enhance and Scale Your TPRM Program David Sahlberg Enhance your TPRM program with tips about what works and what doesn’t based on industry ...
Panel: 2021 Predictions: A Glimpse into the Future Michael Thelander , Chris Goettl , Anthony Baer , Mike Denapoli 2020 has been wrought with an unprecedented number of attacks and vulnerabilities, and a global ...
Ransomware Recovery with Speed and Precision Eric Bodkin Ransomware attacks cause major business disruptions resulting in significant time expenditures, technical resources, and related ...
Why CISOs Need a 90-Day Plan Shreyas Kumar N/A
Detect Everything: Bringing Google Scale Threat Detection to Your SOC Svetla Patnaik Skillful threat detection and investigation starts with a diverse hub of security telemetry to draw ...
Who Accessed Your Data in the Cloud? Your Bosses and Auditors Want to Know Ran Rosin Your business is moving data to the cloud without all the security controls mandated for ...
Beyond Personal Data: Expanding Privacy Best Practices into Broader Data Governance Sam Gillespie Data can be a powerful tool, but also a major compliance risk. Most every function ...
Teaching Others to Hike in the Cybersecurity Wilds Brennan Perkins Every hike takes you to new places, but the basics of hiking are the same: ...
Rational Approach to Zero Trust Chris Pittman Security vendors and analysts are pushing the “Zero Trust” message, but Zero Trust is not ...
The California Privacy Rights Act: What It Is, Why It Is Significant, and How to Prepare Scott Giordano N/A
Address the Skills Gap in Cybersecurity Mike Denapoli To what degree does the cybersecurity skills shortage impact companies’ security posture? How can companies ...