Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Chuck Brooks explores AI's dual role in cybersecurity as both a tool for attackers and defenders. Learn how AI enhances malware and disrupts models, while also enabling threat intelligence, endpoint detection, and predictive analytics. Gain insights into navigating the evolving intersection of AI and cybersecurity.
Explore the impact of GPT-4, -5, and beyond on cybersecurity. Sam Curry examines the dangers of generative AI in creating phishing emails and malware, while also highlighting its potential for threat hunting, hygiene automation, and compliance. Gain insights through real-world use cases and strengthen your defensive strategies.
Join Tom Field and John Horn, Director, Cybersecurity Practice, Aite-Novarica Group in an exploration of customer identity and access management.
Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!
Tom Field joins Congressman Jim Langevin in a discussion about the impact of President Biden's cybersecurity executive order and it's impact on the state of critical infrastructure defense.
Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.
Crypto's Promise: The Use of Digital Assets is a panel discussion led by Ari Redbord, Head of Legal and Governmental Affairs at TRM Labs, along with Alex Zerden, Caroline Hill, and Eric Lorber
Join Ari Redbord in an exploration of how TRM Labs aids law enforcement in tracking crypto fraud and financial crime. Learn about crypto's dual role as a tool for illicit actors and investigators, the challenges of noncompliant VAPs, and the need for regulation to enhance compliance and user safety.
Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.
What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.
Chris Thomas explores how shifting consumer attitudes to fraud post-pandemic are creating new risks for e-commerce. Learn strategies to balance user experience and fraud prevention. Take action now to safeguard your business.
Explore aligning strategy, security, and business priorities to enable digital transformation. Understand digital innovation’s impact on security and learn to build a cyber-resilient organization. Presentation by Shaik Abdulkhader, CISO, Qatar Petrochemical Company.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP in an exploration of role of the FIDO Alliance in standardizing phishing-resistant logins that make authentication simpler and stronger.
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Join Nastassja Finnegan, Cyber Security Officer, FNB South Africa in a discussion about how to get a CIO and the CISO to work on a common goal to facilitate the continued success of their organization.
Join Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.
Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.
Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!
Join Guy Sheppard, Head of APAC Financial Crime, Intelligence and Initiatives for SWIFT for a discussion of digital transformation and how we can leverage AI to predict, protect and improve cybersecurity efforts.
Join Manuel Garat, Marco Lattavo and Denny Prvu in a discussion of how traditional identity technologies struggle to meet demands for secure, frictionless experiences. Register now!
Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.
Join Karen Boyer, Claire Le Gal and David Pollino in a discussion of the criminal use of newer forms of money movement to hide criminal proceeds and cash out.
Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, breaks down the NIST framework’s core, tiers, and profiles. Learn its risk-based approach, integration with other standards, and its role in critical infrastructure. Gain insights into its five functions, 23 categories, and 108 subcategories for managing cybersecurity risks effectively.
Join Prashant Chugh, Group Leader, C-DOT (Centre for Development of Telematics) in this seminar about quantum threats to security and a need for a new post-quantum cryptography.
Join Geetha Nandikotkur and Jayaraj Puthanveedu, MD-Cyber and Tech. Risk, Global Head - Operational Resilience, BNP Paribas Group to discuss building relationships with business unit leaders and driving practical risk-based discussions.
Control application and database access when identity is the new perimeter. Explore how ZTNA enhances access policies, reporting, and threat detection. Gain insights into its use cases and its role within a connected cybersecurity strategy. Presented by Linette Mananghaya, Senior Security Solutions Engineer, Sophos.
Join Chip Mason, Lead, Mainframe Security Product Management, Broadcom, and Henk van Achterberg, Security Strategist, Broadcom as they discuss why zero trust is everywhere, in the cloud, on-premises including, and in the mainframe.
Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
Zero trust is becoming a key enterprise security philosophy, raising questions about its practicality, priority, and challenges. This session explores whether zero trust should be a focus, its role in environments like IoT, and its impact on users, devices, and networks, along with business drivers like cloud and continuity needs. Join us to learn more and assess if zero trust is right for your organization.
Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.
Join Kevin Fu, Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health and Tom field as they discuss the state of medical device security.
In this session, John Kindervag shares the background of his research on broken trust models and identifies the fundamental problem of trusting the internal network and not the external network. Explore Zero Trust with the expert!
Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Join George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.
John Kindervag, Creator of Zero Trust, discusses zero trust, a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong, it is a whole different story.
In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.
Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.