2023 Speakers

01:00PM - Day 2
Are you eager to detect and respond to threats...
View Presentation: Bootstrapping and Scaling a Detection and Response Program

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

11:45AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

12:25PM - Day 1
The balancing act of business disruption or data exposure. ...
View Presentation: Inside the Mind of a CISO: What Keeps Them Up at Night?

02:40PM - Day 1
Creating information security policies which are transparent and commonly...
View Presentation: How to Maintain a Culture of Privacy in the Workplace

11:45AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

02:20PM - Day 2
Providing examples of deepfake technologies being used, and the...

12:40PM - Day 2
- IT Security has been #1 spend last 4...

03:20PM - Day 1
In the modern hybrid cloud, we are all flying...

11:05AM - Day 2
By the end of 2025, it is expected to...
View Presentation: The Acceleration of AI and ML in Cyber Security

02:50PM - Day 2
Understanding various cloud computing services and how they are...
No talk associated with this Speaker.

10:25AM - Day 1
Understanding different approaches to network and perimeter security in...
View Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

03:30PM - Day 1
Protecting APIs requires a unified and fully integrated approach...
View Presentation: APIs: The Number One Attack Vector into The Enterprise

04:40PM - Day 1
The advent of the COVID-19 pandemic and the ongoing...
View Presentation: Cyber Challenges in the Healthcare Sector

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

10:45AM - Day 1
Examples of motivations for posing threats to national critical infrastructure. An...

02:20PM - Day 1
SIEMs have evolved over the past few decades due...
View Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

12:55PM - Day 1
- Explanation of the need for cryptographic agility and...
View Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...
No talk associated with this Speaker.

02:50PM - Day 2
Understanding various cloud computing services and how they are...

09:55AM - Day 1
Implementing new procedures due to the challenges brought about...
View Presentation: The Cyber Security Landscape in 2023 and Beyond

10:45AM - Day 1
Examples of motivations for posing threats to national critical infrastructure. An...
Ravi Gunturi
Sr. Manager, Information Security Officer / Consultant - Digital Product Security
Capital One

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

03:00PM - Day 1
Data is the most valuable asset of the modern...
View Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)

02:50PM - Day 2
Understanding various cloud computing services and how they are...
No talk associated with this Speaker.

04:30PM - Day 1
80% of breaches last year were the result of...
View Presentation: Are you paying attention to your identities? Your attackers are.

09:40AM - Day 1
Chairpersons welcome and opening remarks.
No talk associated with this Speaker.
2022 Speakers

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Altaf Bora
Trust and Safety - Developer Platform Investigations Manager
Fortune 200 Social Media Company

01:15PM - Day 1
To Follow Soon...
View Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...
No talk associated with this Speaker.

01:30PM - Day 2
Understanding how much better protected your data is with...
View Presentation: How Do You Know if Your Cybersecurity Program is Working?
January Walker
Director of Product Management Cyber Security & Digital Identity
Fortune 200 Financial Company

03:10PM - Day 2
Behavioural Biometrics. AI and Machine Learning. Privacy. Blockchain Identity....

03:55PM - Day 1
To Follow Soon...
View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards
Dr. Josef Schroefl
Deputy Director/ CoI on Strategy and Defense
Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

12:15PM - Day 2
How to achieve data confidentiality, integrity, and availability in...
View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

11:55AM - Day 1
Discussing the recent changes in AWS cloud technology and...

11:55AM - Day 1
Discussing the recent changes in public cloud technology and...
View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:45AM - Day 1
Why is it important to assess vendor risk management?...
View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

02:20PM - Day 2
How soft targets are a hard problem in this...

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

11:15AM - Day 2
The complexity of software supply chains, and the risks...
View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

02:50PM - Day 2
Understanding the consequences of social engineering on businesses. How...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:00PM - Day 2
With so many different variables to consider when designing...
View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

10:45AM - Day 2
In the face of skyrocketing cyber risk, detecting and...

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

03:15PM - Day 1
Jeff Platon, CMO , shares insights and experiences from...
View Presentation: Learnings from 25 million Phishing Simulations
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.
Visit our Contact Us page to find out more.