2022 Speakers

10:15AM - Day 2
- Understanding the goal for security automation in your...
View Presentation: Key Security Automation for Compliance in The Cloud

03:35PM - Day 1
- Understanding the key concepts of a cloud security...
View Presentation: Important Considerations When Scaling Your Cloud Security Program

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Altaf Bora
Trust and Safety - Developer Platform Investigations Manager
Fortune 200 Social Media Company

01:15PM - Day 1
To Follow Soon...
View Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...
No talk associated with this Speaker.

01:30PM - Day 2
Understanding how much better protected your data is with...
View Presentation: How Do You Know if Your Cybersecurity Program is Working?
January Walker
Director of Product Management Cyber Security & Digital Identity
Fortune 200 Financial Company

03:10PM - Day 2
Behavioural Biometrics. AI and Machine Learning. Privacy. Blockchain Identity....

03:55PM - Day 1
To Follow Soon...
View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards
Dr. Josef Schroefl
Deputy Director/ CoI on Strategy and Defense
Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

12:15PM - Day 2
How to achieve data confidentiality, integrity, and availability in...
View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

11:55AM - Day 1
Discussing the recent changes in AWS cloud technology and...

11:55AM - Day 1
Discussing the recent changes in public cloud technology and...
View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:45AM - Day 1
Why is it important to assess vendor risk management?...
View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

02:20PM - Day 2
How soft targets are a hard problem in this...

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

11:15AM - Day 2
The complexity of software supply chains, and the risks...
View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

02:50PM - Day 2
Understanding the consequences of social engineering on businesses. How...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:00PM - Day 2
With so many different variables to consider when designing...
View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

10:45AM - Day 2
In the face of skyrocketing cyber risk, detecting and...

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

03:15PM - Day 1
Jeff Platon, CMO , shares insights and experiences from...
View Presentation: Learnings from 25 million Phishing Simulations
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.