Day 2 - 5 November 2020

10:00AM

(MST)

Adeel Khurshid

Director of Security Operations

GitHub

Associated Talks:

10:00AM - Day 2

View Presentation: Why you should automate your SecOps

View Full Info

Presentation: Why you should automate your SecOps

  • How automating security can help you streamline processes
  • Examples of how Github has successfully used automation – ChatOps, self-service and IAM

On-Demand Presentation

. Adeel Khurshid, Director of Security Operations, GitHub

10:20AM

(MST)

Elson Sutanto

Principal Analyst

Juniper Research

View Full Info

Nataraj Nagaratnam

Distinguished Engineer & CTO of IBM Cloud Security

IBM

Associated Talks:

10:20AM - Day 2

View Panel: Is your cloud secure?

11:00AM - Day 2

View Keynote Presentation: Cloud Security 2.0 – Risk based approach to continuous compliance

View Full Info

Sivan Tehila

Director of Solution Architecture

Perimeter 81

Associated Talks:

-

View Perimeter 81

10:20AM - Day 2

View Panel: Is your cloud secure?

11:50AM - Day 2

View Presentation: Modernizing Your Network Infrastructure for a Successful Digital Future

View Full Info

Eoin Keany

Founder & CEO

Edgescan

Associated Talks:

10:20AM - Day 2

View Panel: Is your cloud secure?

11:00AM - Day 1

View Presentation: Enemy at the gates…why traditional vulnerability management has failed. AKA ‘Why hackers don’t give a damn’

View Full Info

Gaurav Gupta

BISO - Goldman Sachs Research

Goldman Sachs

Associated Talks:

10:20AM - Day 2

View Panel: Is your cloud secure?

10:00AM - Day 2

View Presentation: Top tips for moving to cloud

View Full Info

Panel: Is your cloud secure?

  • As more enterprises are moving their sensitive data to the cloud, are security measures keeping up?
  • Exploring the tactics for securing your data within the cloud
  • Where should data be encrypted?
  • Whose responsibility is security in the cloud?

Live webinar panel

Moderator: . Elson Sutanto, Principal Analyst, Juniper Research
. Nataraj Nagaratnam, Distinguished Engineer & CTO of IBM Cloud Security, IBM
. Sivan Tehila, Director of Solution Architecture, Perimeter 81
. Eoin Keany, Founder & CEO, Edgescan
. Gaurav Gupta, BISO - Goldman Sachs Research, Goldman Sachs

11:00AM

(MST)

Nataraj Nagaratnam

Distinguished Engineer & CTO of IBM Cloud Security

IBM

Associated Talks:

10:20AM - Day 2

View Panel: Is your cloud secure?

11:00AM - Day 2

View Keynote Presentation: Cloud Security 2.0 – Risk based approach to continuous compliance

View Full Info

Keynote Presentation: Cloud Security 2.0 – Risk based approach to continuous compliance

When it comes to hosting sensitive and regulated workloads on the public clouds, enterprises are being forced to relook at their approach to managing security and compliance. In this session, we will talk about specific methodologies and technical approaches to help achieve that objective. We will discuss how to:

  • Protect sensitive data – with keep your own key and confidential computing
  • Achieve continuous compliance – integrated with SecDevOps

On-Demand Presentation

. Nataraj Nagaratnam, Distinguished Engineer & CTO of IBM Cloud Security, IBM

11:30AM

(MST)

Todd Hubers

Chief Technology Officer

Dull

Associated Talks:

01:00PM - Day 2

View Panel: The future’s cloud based: Security predictions for 2025

-

View Dull

11:30AM - Day 2

View Presentation: Better Zero-Trust with Micronetworking™

View Full Info

Presentation: Better Zero-Trust with Micronetworking™

  • Technical barriers limit the speed of your team’s response to shifting markets.
  • Explore a world of possibilities with new Micronetworking™ technology.
  • Discover how to amplify your innovation while reducing cybersecurity risk
  • Learn from case studies covering a spectrum of scenarios

On-Demand Presentation

. Todd Hubers, Chief Technology Officer, Dull

11:50AM

(MST)

Sivan Tehila

Director of Solution Architecture

Perimeter 81

Associated Talks:

-

View Perimeter 81

10:20AM - Day 2

View Panel: Is your cloud secure?

11:50AM - Day 2

View Presentation: Modernizing Your Network Infrastructure for a Successful Digital Future

View Full Info

Presentation: Modernizing Your Network Infrastructure for a Successful Digital Future

The way we work has permanently changed. Employees are working outside of the corporate office and organizations are increasingly relying upon cloud technologies. With an ever-expanding network on the horizon, the traditional hardware-based security appliances are no longer adequate. While the entire cybersecurity space becomes oversaturated with solutions, complicating the consumption of cyber and network security, there is a need to converge to provide a more holistic cybersecurity approach. In August 2019, leading research and advisory company Gartner coined a term for the new model of network security: Secure Access Service Edge (SASE). SASE platforms combine software-based and service-based networks, providing a unification of different security solutions.

On Demand presentation

. Sivan Tehila, Director of Solution Architecture, Perimeter 81

12:00PM

Lunch & Speed Networking on event platform

01:00PM

(MST)

Ashwin Krishnan

Chief Communicator

SecureDynamics

View Full Info

Grant Asplund

Growth Technologies Security Evangelist

Check Point Software Technologies

Associated Talks:

01:00PM - Day 2

View Panel: The future’s cloud based: Security predictions for 2025

View Full Info

Brandon Traffanstedt

Global Director, Systems Engineering

CyberArk

Associated Talks:

-

View CyberArk

01:00PM - Day 2

View Panel: The future’s cloud based: Security predictions for 2025

View Full Info

Todd Hubers

Chief Technology Officer

Dull

Associated Talks:

01:00PM - Day 2

View Panel: The future’s cloud based: Security predictions for 2025

-

View Dull

11:30AM - Day 2

View Presentation: Better Zero-Trust with Micronetworking™

View Full Info

Panel: The future’s cloud based: Security predictions for 2025

  • Discussing predictions for the next steps in cloud technology and how they will help your digital transformation goals
  • Where will data be, and how will things need to change to protect it?
  • How to ensure visibility to your data and potential vulnerabilities
  • Keeping your applications and remote access secure

Live webinar panel

Moderator: . Ashwin Krishnan, Chief Communicator, SecureDynamics
. Grant Asplund, Growth Technologies Security Evangelist, Check Point Software Technologies
. Brandon Traffanstedt, Global Director, Systems Engineering , CyberArk
. Todd Hubers, Chief Technology Officer, Dull

01:40PM

(MST)

Teju Shyamsundar

Sr. Product Marketing Manager

Okta

Associated Talks:

-

View Okta

01:40PM - Day 1

View Presentation: Shift to Long-Term Remote Work with Adaptive Access Management Policies

View Full Info

Presentation: Shift to Long-Term Remote Work with Adaptive Access Management Policies

Most companies have successfully implemented short-term remote work solutions by now, but about the long term? The biggest challenge of a decentralized workforce is ensuring employees are empowered with the tools they need to successfully do their jobs. Learn how to mitigate your remote access risks, shift your security perimeter to protect access to all resources and ensure employees stay productive remotely by securing access via a long-term identity strategy. Join this session from Okta to learn how to:

  • Mitigate remote access risks
  • Shift your security perimeter to protect access to all resources—from VPNs, to cloud and on-prem apps, to servers and APIs
  • Ensure employees stay productive remotely by securing access via multi-factor authentication, adaptive access policies, and other collaboration tools that you can integrate with Okta

On-Demand Presentation

. Teju Shyamsundar, Sr. Product Marketing Manager, Okta

02:00PM

(MST)

Rod Kaleho

Director, Security & Risk (IAM & Automation)

Cargill

Associated Talks:

02:00PM - Day 2

View Presentation: Digital Identity for the Modern Enterprise

View Full Info

Presentation: Digital Identity for the Modern Enterprise

  • How is identity evolving with an increasingly mobile workforce?
  • What is zero trust and how important are zero trust architectures in securing cloud based apps and data?
  • What role will technologies like Blockchain, and biometrics have in securing our future digital identities?
  • Discussing sectors, companies and case studies that have succeeded in tackling the issues around securing our digital selves.

On-Demand Presentation

. Rod Kaleho, Director, Security & Risk (IAM & Automation), Cargill

02:20PM

(MST)

Ashish Gupta

Director of Technology, Identity Access Management

Target

Associated Talks:

02:20PM - Day 2

View Presentation: Privileged Access Governance

View Full Info

Presentation: Privileged Access Governance

  • How to effectively govern privileged access? Common problems and solutions.
  • How to adapt to overcome challenges of owner movements, outages due to credential rotation?
. Ashish Gupta, Director of Technology, Identity Access Management, Target