2022 Speakers

Marquis C Twitter
Twitter

Marquis Carroll

Tech Lead - Cloud and Compute Security

Twitter

Small Hash

02:30PM - Day 2

- Understanding the goal for security automation in your...

View Presentation: Key Security Automation for Compliance in The Cloud

Small Hash

03:35PM - Day 1

- Understanding the key concepts of a cloud security...

View Presentation: Important Considerations When Scaling Your Cloud Security Program

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

1651335312135
Meta

Brian Jones

Head of Application Security & Vulnerability Management

Meta

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Carmen Marsh
United Cybersecurity Alliance

Carmen Marsh

President & CEO

United Cybersecurity Alliance

Elisabeth Cartier
Maven Clinic

Elizabeth Cartier

Director - Security

Maven Clinic

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Kavitha Venkataswamy
Capital One

Kavitha Venkataswamy

Director - Digital Product Security

Capital One

Srini Capital One
Capital One

Srinivasan R.

Senior Manager Cyber - Technical

Capital One

MichaeL Fulton
Ohio State

Michael Fulton

Adjunct Faculty

The Ohio State University

No talk associated with this Speaker.

View Full Info

Bruce Kaalund

Bruce Kaalund

Cybersecurity Specialist

Governance, Risk & Compliance

Small Hash

01:30PM - Day 2

Understanding how much better protected your data is with...

View Presentation: How Do You Know if Your Cybersecurity Program is Working?

View Full Info

January Walker

January Walker

Director of Product Management Cyber Security & Digital Identity

Fortune 200 Financial Company

Small Hash

03:10PM - Day 2

Fuzz Testing – Autonomous Application Security Testing – going...

View Presentation: The Next-Generation of Application Security – The Rise of the Chief Product Security Officer

View Full Info

Joerg Borchert Headshot New 2 Scaled
TCG New Logo

Dr. Joerg Borchert

President and Chairman

Trusted Computing Group

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Dr. Josef Schroefl
Hybrid CoE

Dr. Josef Schroefl

Deputy Director/ CoI on Strategy and Defense

Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

Derek Kurnus
DTS 1

Derek Kernus

Director of Cybersecurity Operations

DTS

Small Hash

01:45PM - Day 1

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: DTS

View Full Info

Edward Tuorinsky Web 002
DTS 1

Edward Tuorinsky

Managing Principal

DTS

Small Hash

01:45PM - Day 1

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: DTS

View Full Info

Brad Jones Seagate
Seagate

Brad Jones

CISO, VP of Information Security

Seagate Technology

Small Hash

12:15PM - Day 2

How to achieve data confidentiality, integrity, and availability in...

View Presentation: Keeping Your Data Secure Amid Multicloud Friction

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Steve Van Lare 1
20181025 Final Wordmark

Steve Van Lare

VP of Engineering

Anjuna

Small Hash

11:55AM - Day 1

Discussing the recent changes in AWS cloud technology and...

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

Small Hash

11:55AM - Day 1

Discussing the recent changes in public cloud technology and...

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Andrew ProcessUnity
Process Unity Full

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

Small Hash

10:45AM - Day 1

Why is it important to assess vendor risk management?...

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Willy SGS
Sgs

Willy Fabritius

Global Head of Strategy & Business Development

SGS

Small Hash

11:35AM - Day 2

Familiarisation with the cyber criminal’s toolkit: which threats are...

View Panel: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Andy W Oort
Oort

Andy Winiarski

Head of Solutions Engineering

Oort

Small Hash

02:20PM - Day 2

How soft targets are a hard problem in this...

View Presentation: The People-Powered Perimeter Puzzle

View Full Info

@colin Scaled
Atsi

Colin Constable

CO-FOUNDER

Atsign

Small Hash

12:45PM - Day 2

A clear integrated strategy is key to digital transformation...

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Tim M Synopsys
Synopsys Color 1

Tim Mackey

Technical Evangelist

Synopsys

Small Hash

11:15AM - Day 2

The complexity of software supply chains, and the risks...

View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

View Full Info

Jim N FRSecure
FRSecure

Jim Nelson

Information Security Consultant

FRSecure

Small Hash

02:50PM - Day 2

Understanding the consequences of social engineering on businesses. How...

View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

View Full Info

Katherine McGauley Darktrace
Darktrace Logo B O 002 1

Katherine McGauley

Senior Technical Manager, US-West

Darktrace

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Garrett B Ermetic
Ermtetic

Garrett Bechler

Senior Director, World Wide Systems Engineering

Ermetic

Small Hash

02:00PM - Day 2

With so many different variables to consider when designing...

View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

View Full Info

BRIANNA LEDDY E1663921528248
Darktrace Logo B O 002 1

Brianna Leddy

Director of Analysis

Darktrace

Small Hash

10:45AM - Day 2

In the face of skyrocketing cyber risk, detecting and...

View Presentation: How AI Can Think Like an Attacker

View Full Info

Jimmy Jones
Zariot

Jimmy Jones

Head of Security

Zariot

Small Hash

12:45PM - Day 2

A clear integrated strategy is key to digital transformation...

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Mika Aalto
Hoxhunt 1

Mika Aalto

CEO

Hoxhunt

Small Hash

03:15PM - Day 1

Content To Follow Soon... 

View VIRTUAL PRESENTATION: Hoxhunt

Small Hash

03:15PM - Day 1

Mika Aalto, CEO & Co-founder, shares insights and experiences...

View Presentation: Learnings from 25 million Phishing Simulations

View Full Info

Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.

+44 (0)117 980 9020