2023 Speakers

01:00PM - Day 2
Are you eager to detect and respond to threats...
View Presentation: Bootstrapping and Scaling a Detection and Response Program

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

11:45AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

12:25PM - Day 1
The balancing act of business disruption or data exposure. ...
View Presentation: Inside the Mind of a CISO: What Keeps Them Up at Night?

02:40PM - Day 1
Creating information security policies which are transparent and commonly...
View Presentation: How to Maintain a Culture of Privacy in the Workplace

11:45AM - Day 1
Explaining the importance of a zero-trust approach, and how...
View Fireside Chat: Never Trust, Always Verify: The Zero-Trust Approach

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

02:20PM - Day 2
Providing examples of deepfake technologies being used, and the...

12:40PM - Day 2
- IT Security has been #1 spend last 4...

03:20PM - Day 1
In the modern hybrid cloud, we are all flying...

11:05AM - Day 2
By the end of 2025, it is expected to...
View Presentation: The Acceleration of AI and ML in Cyber Security

02:50PM - Day 2
Understanding various cloud computing services and how they are...
No talk associated with this Speaker.

10:25AM - Day 1
Understanding different approaches to network and perimeter security in...
View Presentation: Evolving Network Security Strategies for the Public Cloud: What You Need to Know

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

03:30PM - Day 1
Protecting APIs requires a unified and fully integrated approach...
View Presentation: APIs: The Number One Attack Vector into The Enterprise

04:40PM - Day 1
The advent of the COVID-19 pandemic and the ongoing...
View Presentation: Cyber Challenges in the Healthcare Sector

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...

10:45AM - Day 1
Examples of motivations for posing threats to national critical infrastructure. An...

02:20PM - Day 1
SIEMs have evolved over the past few decades due...
View Presentation: Mission SIEMpossible – From Legacy SIEM to Detection-as-Code

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

12:55PM - Day 1
- Explanation of the need for cryptographic agility and...
View Presentation: Future-Proofing Your Security: Cryptographic Agility and Post-Quantum Computing

12:00PM - Day 2
Exploring the damaging consequences which social engineering brings to...

03:50PM - Day 1
Recent developments in MFA, biometrics, ZZO, SSO, and other...
No talk associated with this Speaker.

02:50PM - Day 2
Understanding various cloud computing services and how they are...

09:55AM - Day 1
Implementing new procedures due to the challenges brought about...
View Presentation: The Cyber Security Landscape in 2023 and Beyond

10:45AM - Day 1
Examples of motivations for posing threats to national critical infrastructure. An...
Ravi Gunturi
Sr. Manager, Information Security Officer / Consultant - Digital Product Security
Capital One

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

03:00PM - Day 1
Data is the most valuable asset of the modern...
View Presentation: 4 Challenges to Data Recoverability in AWS (and how to overcome them)

02:50PM - Day 2
Understanding various cloud computing services and how they are...
No talk associated with this Speaker.

04:30PM - Day 1
80% of breaches last year were the result of...
View Presentation: Are you paying attention to your identities? Your attackers are.

09:40AM - Day 1
Chairpersons welcome and opening remarks.
No talk associated with this Speaker.
2022 Speakers

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:15AM - Day 2
Building an effective cybersecurity program requires a commitment to...
View Presentation: Making your Cyber Security Program Effective in 2023

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

10:15AM - Day 1
In this talk, we will present the third party...
View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain
Altaf Bora
Trust and Safety - Developer Platform Investigations Manager
Fortune 200 Social Media Company

01:15PM - Day 1
To Follow Soon...
View Presentation: Symbiosis – How to Build and Scale a Data Privacy Team

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...
No talk associated with this Speaker.

01:30PM - Day 2
Understanding how much better protected your data is with...
View Presentation: How Do You Know if Your Cybersecurity Program is Working?
January Walker
Director of Product Management Cyber Security & Digital Identity
Fortune 200 Financial Company

03:10PM - Day 2
Behavioural Biometrics. AI and Machine Learning. Privacy. Blockchain Identity....

03:55PM - Day 1
To Follow Soon...
View Presentation: How To Stay Ahead of Insider Threats leveraging TCG Standards
Dr. Josef Schroefl
Deputy Director/ CoI on Strategy and Defense
Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

04:15PM - Day 1
The emergence of new and disruptive cyber technologies will...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

01:45PM - Day 1
It’s become imperative for organizations from Main Street to...

12:15PM - Day 2
How to achieve data confidentiality, integrity, and availability in...
View Presentation: Keeping Your Data Secure Amid Multicloud Friction

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

11:55AM - Day 1
Discussing the recent changes in AWS cloud technology and...

11:55AM - Day 1
Discussing the recent changes in public cloud technology and...
View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1
Discussing how to prevent compliance violations. Understanding future cloud-based...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

10:45AM - Day 1
Why is it important to assess vendor risk management?...
View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

02:20PM - Day 2
How soft targets are a hard problem in this...

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

11:15AM - Day 2
The complexity of software supply chains, and the risks...
View Presentation: Software Supply Chain – The Challenges, Risks, and Strategies for Success

02:50PM - Day 2
Understanding the consequences of social engineering on businesses. How...

02:05PM - Day 1
Deterrence is key: ensuring you have appropriate policies, strong...

02:00PM - Day 2
With so many different variables to consider when designing...
View Presentation: Improving Cloud Infrastructure Security with a Maturity Assessment Framework

10:45AM - Day 2
In the face of skyrocketing cyber risk, detecting and...

11:35AM - Day 2
Familiarisation with the cyber criminal’s toolkit: which threats are...
View Fireside Chat: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

12:45PM - Day 2
A clear integrated strategy is key to digital transformation...
View Presentation: Accelerating Digital Transformation – Flip the Approach

03:15PM - Day 1
Jeff Platon, CMO , shares insights and experiences from...
View Presentation: Learnings from 25 million Phishing Simulations
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.