2022 Speakers

Marquis C Twitter
Twitter

Marquis Carroll

Tech Lead - Cloud and Compute Security

Twitter

Small Hash

10:15AM - Day 2

- Understanding the goal for security automation in your...

View Presentation: Key Security Automation for Compliance in The Cloud

Small Hash

03:35PM - Day 1

- Understanding the key concepts of a cloud security...

View Presentation: Important Considerations When Scaling Your Cloud Security Program

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Carmen Marsh
United Cybersecurity Alliance

Carmen Marsh

President & CEO

United Cybersecurity Alliance

Small Hash

04:15PM - Day 1

The emergence of new and disruptive cyber technologies will...

View Panel: The Power of Cyber in Hybrid Threats and Securing the Global Supply Chain with Help of AI

View Full Info

Aakash Cyber
Whatsapp

Aakash Ravi

Program Manager for Privacy and Compliance

Whatsapp

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Elisabeth Cartier
Maven Clinic

Elizabeth Cartier

Director - Security

Maven Clinic

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Kavitha Venkataswamy
Capital One

Kavitha Venkataswamy

Director - Digital Product Security

Capital One

Srini Capital One
Capital One

Srinivasan R.

Senior Manager Cyber - Technical

Capital One

Aaltaf

Altaf Bora

Trust and Safety - Developer Platform Investigations Manager

Fortune 200 Social Media Company

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

MichaeL Fulton
Ohio State

Michael Fulton

Adjunct Faculty

The Ohio State University

No talk associated with this Speaker.

View Full Info

Bruce Kaalund

Bruce Kaalund

Cybersecurity Specialist

Governance, Risk & Compliance

Small Hash

01:30PM - Day 2

Understanding how much better protected your data is with...

View Presentation: How Do You Know if Your Cybersecurity Program is Working?

View Full Info

January Walker

January Walker

Director of Product Management Cyber Security & Digital Identity

Fortune 200 Financial Company

Small Hash

03:10PM - Day 2

Behavioural Biometrics. AI and Machine Learning. Privacy. Blockchain Identity....

View Presentation: Returning Control of Identity

View Full Info

Joerg Borchert Headshot New 2 Scaled
TCG New Logo

Dr. Joerg Borchert

President and Chairman

Trusted Computing Group

Dr. Josef Schroefl
Hybrid CoE

Dr. Josef Schroefl

Deputy Director/ CoI on Strategy and Defense

Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

Small Hash

04:15PM - Day 1

The emergence of new and disruptive cyber technologies will...

View Panel: The Power of Cyber in Hybrid Threats and Securing the Global Supply Chain with Help of AI

View Full Info

Derek Kurnus
DTS 1

Derek Kernus

Director of Cybersecurity Operations

DTS

Small Hash

01:45PM - Day 1

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: DTS

View Full Info

Edward Tuorinsky Web 002
DTS 1

Edward Tuorinsky

Managing Principal

DTS

Small Hash

01:45PM - Day 1

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: DTS

View Full Info

Brad Jones Seagate
Seagate

Brad Jones

CISO, VP of Information Security

Seagate Technology

Small Hash

12:15PM - Day 2

How to achieve data confidentiality, integrity, and availability in...

View Presentation: Keeping Your Data Secure Amid Multicloud Friction

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Steve Van Lare 1
20181025 Final Wordmark

Steve Van Lare

VP of Engineering

Anjuna

Small Hash

11:55AM - Day 1

Discussing the recent changes in AWS cloud technology and...

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

Small Hash

11:55AM - Day 1

Discussing the recent changes in public cloud technology and...

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

Small Hash

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Andrew ProcessUnity
Process Unity Full

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

Small Hash

10:45AM - Day 1

Why is it important to assess vendor risk management?...

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Willy SGS
Sgs

Willy Fabritius

Global Head of Strategy & Business Development

SGS

Small Hash

11:35AM - Day 2

Familiarisation with the cyber criminal’s toolkit: which threats are...

View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Andy W Oort
Oort

Andy Winiarski

Head of Solutions Engineering

Oort

Small Hash

02:20PM - Day 2

How soft targets are a hard problem in this...

View Presentation: The People-Powered Perimeter Puzzle

View Full Info

@colin Scaled
Atsi

Colin Constable

CO-FOUNDER

Atsign

Small Hash

12:45PM - Day 2

A clear integrated strategy is key to digital transformation...

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Tim M Synopsys
Synopsys Color 1

Tim Mackey

Technical Evangelist

Synopsys

Small Hash

11:15AM - Day 2

The complexity of software supply chains, and the risks...

View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

View Full Info

Jim N FRSecure
FRSecure

Jim Nelson

Information Security Consultant

FRSecure

Small Hash

02:50PM - Day 2

Understanding the consequences of social engineering on businesses. How...

View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

View Full Info

Katherine McGauley Darktrace
Darktrace Logo B O 002 1

Katherine McGauley

Senior Technical Manager, US-West

Darktrace

Small Hash

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Garrett B Ermetic
Ermtetic

Garrett Bechler

Senior Director, World Wide Systems Engineering

Ermetic

Small Hash

02:00PM - Day 2

With so many different variables to consider when designing...

View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

View Full Info

BRIANNA LEDDY E1663921528248
Darktrace Logo B O 002 1

Brianna Leddy

Director of Analysis

Darktrace

Small Hash

10:45AM - Day 2

In the face of skyrocketing cyber risk, detecting and...

View Presentation: How AI Can Think Like an Attacker

Small Hash

11:35AM - Day 2

Familiarisation with the cyber criminal’s toolkit: which threats are...

View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Jimmy Jones
Zariot

Jimmy Jones

Head of Security

Zariot

Small Hash

12:45PM - Day 2

A clear integrated strategy is key to digital transformation...

View Presentation: Accelerating Digital Transformation – Flip the Approach

View Full Info

Hoxhunt New Speaker
Hoxhunt 1

Jeff Platon

Chief Marketing Officer

Hoxhunt

Small Hash

03:15PM - Day 1

Content To Follow Soon... 

View VIRTUAL PRESENTATION: Hoxhunt

Small Hash

03:15PM - Day 1

Jeff Platon, CMO , shares insights and experiences from...

View Presentation: Learnings from 25 million Phishing Simulations

View Full Info

Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.

+44 (0)117 980 9020