2022 Co-Located Speakers Include
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
2021 Speakers Included
11:40AM - Day 1
The main elements of a modern cyber threat detection...
12:00PM - Day 2
Nowadays enterprises that are going through a digital transformation...
12:30PM - Day 1
Coping with reduced security budgets and staffing post-pandemic – Best practices...
View PRERECORDED PANEL: Doing more with less: Strategies for security leaders
09:50AM - Day 2
Identifying and communicating the detection of a security breach...
09:50AM - Day 1
Understanding the difference between disaster recovery and continuity management...
10:40AM - Day 1
Understanding the most common cloud security oversights How can...
View VIRTUAL: Live Panel – Secure cloud access for the agile enterprise
12:30PM - Day 1
Coping with reduced security budgets and staffing post-pandemic – Best practices...
View PRERECORDED PANEL: Doing more with less: Strategies for security leaders
10:40AM - Day 1
Coping with reduced security budgets and staffing post-pandemic - Best practices...
View Panel: Doing more with less: Strategies for security leaders
02:40PM - Day 2
Throwing policies at the problem solves compliance, not security...
12:00PM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security
10:40AM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
12:40PM - Day 2
Rebooting an outdated security strategy – how far should...
View PRERECORDED PANEL: Strong to the core: Security for digital transformation
01:30PM - Day 2
Rebooting an outdated security strategy – how far should...
View Panel: Strong to the core: Security for digital transformation
10:40AM - Day 1
What are the best things to happen in the...
View VIRTUAL: Live Panel – Levelling the playing field – what to have in your arsenal
09:50AM - Day 2
How to do secure, fast innovation in a corporate...
10:40AM - Day 1
Understanding the most common cloud security oversights How can...
View VIRTUAL: Live Panel – Secure cloud access for the agile enterprise
09:30AM - Day 2
Opening talk – overview of sessions and highlights.
12:00PM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security
10:40AM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
03:00PM - Day 2
The cyber arena contains of heterogeneous groups of threat...
View Crisis management: Remaining vigilant – forewarned is forearmed
12:40PM - Day 2
Rebooting an outdated security strategy – how far should...
View PRERECORDED PANEL: Strong to the core: Security for digital transformation
01:30PM - Day 2
Rebooting an outdated security strategy – how far should...
View Panel: Strong to the core: Security for digital transformation
03:10PM - Day 1
How communication plays a role in Information Security How...
View Communicating information security: Translation mechanisms for awareness retention and buy-in
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
10:40AM - Day 1
What are the best things to happen in the...
View VIRTUAL: Live Panel – Levelling the playing field – what to have in your arsenal
10:10AM - Day 1
In recent months, supply chain attacks have made headlines...
View Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk
11:20AM - Day 1
Every business depends on granting access to critical applications,...
View VIRTUAL: Who’s Logging In? Your Identity System Is a Prime Target for Attackers
11:40AM - Day 1
You’ll come away from this session with a practical...
View Would Your Organization Fail the Active Directory Security Assessment?
09:40AM - Day 1
Opening talk – overview of sessions and highlights.
10:10AM - Day 2
The global pandemic and impacts stemming from COVID-19 shook...
View Secure Work Anywhere: Supporting the New Normal from Corporate Policies to Security
No talk associated with this Speaker.
02:10PM - Day 2
The problem with SIEM – too resource intensive, and...
11:20AM - Day 2
Application Program Interface (API) security is an essential part...
02:40PM - Day 1
An increasing number of MSPs have reported being victims...
View Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
12:40PM - Day 2
Rebooting an outdated security strategy – how far should...
View PRERECORDED PANEL: Strong to the core: Security for digital transformation
12:00PM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security
12:00PM - Day 1
An increasing number of MSPs have reported being victims...
View VIRTUAL: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
01:30PM - Day 2
Rebooting an outdated security strategy – how far should...
View Panel: Strong to the core: Security for digital transformation
10:40AM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
12:20PM - Day 1
Board, risk, procurement, business, investors, insurers, partners, clients, regulators/government,...
12:40PM - Day 2
Rebooting an outdated security strategy – how far should...
View PRERECORDED PANEL: Strong to the core: Security for digital transformation
01:30PM - Day 2
Rebooting an outdated security strategy – how far should...
View Panel: Strong to the core: Security for digital transformation
12:00PM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security
10:40AM - Day 2
How have changes to the enterprise perimeter impacted cybersecurity...
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.