2022 Speakers Include

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

01:50PM - Day 1
- Global Trends in IT Security - Challenges in...
View Presentation: IT Security Landscape – Past Present and Future

02:50PM - Day 1
Artificial Intelligence is gradually taking a prominent part in...
View Presentation: Will AI Disrupt the Future of Cyber Security?

03:40PM - Day 2
In this session you will discover 3 practical ways...
View Presentation: Accelerating Digital Transformation with Cloud

04:10PM - Day 1
The presentation will aim at discussing the broad challenges...

12:30PM - Day 2
This Session Will Explore... How to implement an OT...

10:10AM - Day 2
IT vs OT: Key differentiators. Why Architecture vs Design...
View Presentation: IT/OT Convergence – A Cyber Security Approach

05:10PM - Day 1
Session Content To Follow Soon...
View Presentation: Offensive clouds – How peirates sail through the stormy sky

09:45AM - Day 1
What are the main cyber risks which we are...
View Presentation: Assessing Cyber Security and Risk in a Modern Landscape

10:15AM - Day 1
Snyk surveyed hundreds of cloud engineering and security professionals...
View Presentation: Insights Into Cloud Native Threats and Security Trends

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

10:30AM - Day 2
Cloud Security world is quite complex with a lot...

11:00AM - Day 2
The days of security as a “nice to have”...
No talk associated with this Speaker.

02:30PM - Day 1
In this session, Driving your Cloud Security Forward to...
View Presentation : Driving Your Cloud Security Forward – Be Ready for the Future

02:30PM - Day 1
In this session, Julien Soukhavong will present the importance...
View VIRTUAL PRESENTATION: Get Visibility and Mitigate External Threats Targeting your Company

01:00PM - Day 1
What is Continuous Cloud Compliance? How to discover anomalies...

01:00PM - Day 1
Security threats against cloud infrastructure are increasing in frequency...
View VIRTUAL PRESENTATION: Demystifying Security Chaos Engineering

11:30AM - Day 2
Join us on this session and get latest updates...

11:30AM - Day 2
Supply chain attacks, AI-based spear phishing, and hybrid working...
View VIRTUAL PRESENTATION: Cybercrime Trends 2022: How your organisation can stay safe

01:20PM - Day 2
The worldwide cyber talent shortage is real and growing....
View Presentation: Staying Secure in the Midst of the Talent Crisis

12:30PM - Day 1
Outlining best practices and compliance standards is a good...

04:00PM - Day 2
Backup is a core piece of the IT management...
View VIRTUAL PRESENTATION: Ninja Data Protection: Modern Backup for Modern Workflows

04:00PM - Day 2
Backup is a core piece of the IT management...
View VIRTUAL PRESENTATION: Ninja Data Protection: Modern Backup for Modern Workflows

05:00PM - Day 1
Dive into the latest threat intelligence to understand how...
View VIRTUAL PRESENTATION: Threat Disruption: Securing 2022 from 2021

05:00PM - Day 1
Don’t become another statistic! Being affected by Ransomware is...

04:40PM - Day 1
Content To Follow Soon...
View VIRTUAL PRESENTATION: Identifying Risk in Cloud Environments

04:40PM - Day 1
Security at the speed of cloud is hard. Cloud-native...
View Presentation: Anatomy Of Cloud Breaches And How To Prevent Them

12:50PM - Day 1
Can I trust my IT-Hardware Vendors? What is the...
View Presentation: Zero Trust Hardware, What is it and How Do I get it?

12:50AM - Day 2
In this fireside chat, Marvin Ngoma from the Global...

12:50PM - Day 2
The inherent benefits of cost savings and improved overall...
View Presentation: How Safe is Your Cloud? Deciphering Cloud Threats and Security Models

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

05:30PM - Day 1
Getting a data deletion request can be time-consuming if...

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

03:10PM - Day 1
As apps and data move to the cloud to...
View Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

02:10PM - Day 2
There’s a human element to modern AppSec that can’t...
View Presentation: Security Champions – The Human Side of DevSecOps

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

12:00PM - Day 2
This session will discuss... The urgent need for dynamic...
View Presentation: Identity First Security – The Way Ahead to Building a Zero Trust Future

02:30PM - Day 2
The future of cyber security correlates with the future...
View Panel: The Future of Cybersecurity – Where Should We Go From Here?

03:10PM - Day 2
An all-too-common belief is that to move fast you...
View Presentation: How SaaS Companies are Successfully Scaling Security Age

11:00AM - Day 2
To follow soon ...
View VIRTUAL PRESENTATION: Implementing True DevSecOps with People, Processes & Technology

03:20PM - Day 2
Many organisations have successfully moved their businesses to a...
View Presentation: 5 Facts every Data Defender should know to Secure the Future

03:40PM - Day 1
The session will examine trends in Malware use, distribution,...
View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...

05:30PM - Day 1
Content To Follow Soon...
View VIRTUAL PRESENTATION: Accelerate, Simplify & Cut Costs of your Application Security Program

02:20PM - Day 1
Privileged Credentials are considered the "keys of the kingdom",...
View Presentation: Trends in the PAM Market According to Gartner

11:40AM - Day 1
Content To Follow Soon...
View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1
Reviewing Cloud Vulnerabilities in 2022. Despite the increasing adoption...
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.