Building a World-Class AppSec Program
Jeremy Brooks, Information Security Architect, Aaron’s, Inc.
Eric Simmons, Information Security Manager & Application Security Lead, Aaron’s, Inc.
Establishing Security Ambassadors to Fortify a Secure Organizational Culture
Omar Prunera, Senior Director ESI Business Security Office and Global Programs, ADP
Success Factors for Securing a Multi- or Hybrid-cloud Environment
Carson Sweet, Co-Founder and Chief Executive Officer, CloudPassage
Expanding Fraud Prevention and Detection and Cybersecurity at Scale
Stephen Pedersen, Director, Information Security, Coast Capital Savings
Establishing a Risk Culture in the Enterprise
Tommy Todd, VP, Security, Code42
GE’s Journey to Zero Trust
Justin Acquaro, Global CISO, GE
Challenge the Rules of Security by Proactively Transforming the Threat Surface
Robert DeVito, Global Chrome Customer and Partner Sales Engineering, Google Chrome
The CISO’s Evolving Role: Career Tips and Guidance for Today’s Security Leaders
Tim Youngblood, Corporate VP, Global CISO, McDonald’s
CISOs and Personal Liability in Today’s Business Climate
Aravind Swaminathan, Global Co-Chair, Cyber, Privacy & Data Innovation, Orrick, Herrington & Sutcliffe LLP
Aligning Security, Compliance and Privacy Across Inventory Tracking
Kandice Samuelson, Senior Director, IT Governance, PPD
Brad Wells, Executive Director, Information Security, PPD
Keeping a Remote Workforce Secure: Lessons Learned, Tips for the Future
Lucian Constantin, Senior Writer, CSO Online, IDG Communications, Inc.
Matthew Finnegan, Senior Reporter, Computerworld, IDG Communications, Inc.
Ken Mingis, Executive Editor, Computerworld, IDG Communications Inc.
The Next Generation of Cyber Security: Autonomous Cyber AI
Justin Fier, Director of Threat Intelligence and Analytics, Darktrace
An IT Operations, Security, and Risk Management Platform That Responds to Plain English Queries
Hosted by Tanium
Overcoming Data Overload: Data Discovery and Risk Formulas that Standardize Risk at Scale
Nick Pavlichek, GRC Product Manager, OneTrust
Navigating Enterprise Security in a Post-Compromise Reality
Dan Greer, Director of Sales Engineering, ExtraHop
New IT, But Same Old Threat: A Modern Look at Identity Security
Barak Feldman, Senior Vice President, Identity Security GTM, CyberArk
Detecting and Counteracting Cyberattacks on Active Directory
Tony Cole, CTO, Attivo Networks
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Rise of Next-Gen Software Supply Chain Attacks
Ax Sharma, Developer Advocate, Sonatype
Michelle Dufty, Senior Vice President of Marketing, Sonatype