Session descriptions listed in “On Demand Sessions” tab above.
Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development
Chris Green, Head of PR and Communications EMEA, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper
Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.
How to Achieve Least Privilege at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Maya Neelakandhan, Head of Customer Success and Support, CloudKnox Security
How to Stop Attackers from Owning Your Active Directory
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks
How to Create Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich
How DevSecOps is Critical to a Successful Cloud Strategy
Sathish Muthukrishnan, Chief Information, Data and Digital Officer, Ally Financial
How to Use Cyber Asset Management to Build a Strong Security Program
Akash Ganapathi, Principal Solutions Architect/Team Lead, JupiterOne
Top Strategies for Securing Your Transformation to the Cloud
Jason Mitchell, SVP Engineering, Centrify
Ransomware in Focus: How AI Surgically Contains the Threat
Brianna Leddy, Director of Analysis, Darktrace
How can you be ready for the cyber-attack that’s heading your way?
Don Foster, Global Vice President, Sales Engineering, Commvault
Measuring Security & Building Trust: Digital Transformation Insights from Leaders
Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack
How to Gain Holistic Visibility with Security
Presented by Elastic
How to Operationalize GRC
Rob Ellis, Senior Vice President of Sales, Reciprocity Labs
Experian Customer Story
Palo Alto Customer Story: Experian
Three Strategies to Ensure Cybersecurity and Resilience for Hybrid Microsoft Identities
Robert Bobel, Founder and Chief Executive Officer, Cayosoft
Trusting the Un-trustable: How to Remotely Verify the Integrity and Identity of Edge-to-Cloud Software
Andrew Jessup, Director of Product Management, Security Engineering, Hewlett Packard Enterprise
Preparing for the Next Generation of Ransomware Attacks
JJ Cranford, Product Marketing Manager, Cybereason
How to Integrate Security as a Front End Feed to Your GRC
Nick Pavlichek, Product Manager, OneTrust