We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Data Security Summit

Search

Clear Expand Collapse

A New Era of Data Privacy Compliance in Texas

Greg Tatum, Jessica Bolton, Sudhakar Vishnubhotla and Asif Effendi discuss TDPSA compliance, implementing user-friendly privacy systems and cross-functional collaboration strategies.

Price
Course duration Duration: 25 minutes

Agentic AI and the Future of Autonomy in Security

Ravikumar Mukkamala, Bryce Carter and Chris Bunton examine autonomous AI systems, secure integration strategies and emerging vulnerabilities in the third wave of AI.

Price
Course duration Duration: 25 minutes

An Immersive Simulation of AI-Augmented Insider Threats

Robert Golladay of U.S. Secret Service leads an immersive simulation demonstrating how AI amplifies insider threats through psychological manipulation and provides proven defense strategies for systematic compromise.

Price
Course duration Duration: 25 minutes

Building a Resilient Data Security Strategy

Zechariah Akinpelu of Unity Bank, Everett Bates of Crunchyroll and Tarek Ahmed of Cenlar FSB explore multi-faceted protection strategies, AI-powered anomaly detection and adaptive access controls for hybrid and cloud-native environments.

Price
Course duration Duration: 35 minutes

Building Intelligent Data Infrastructure

Meghan Hollis-Peel, Shuchi Agrawal and Elena Michaeli discuss intelligent systems for operational efficiency, embedded security measures and flexible infrastructure for complex workloads.

Price
Course duration Duration: 30 minutes

Data Privacy & Decoupling

Kevin Dunn of U.S. Retirement & Benefits Partner and Priya Narayan of Southwest Airlines discuss data decoupling strategies, privacy regulation compliance and best practices for minimizing data breach risks.

Price
Course duration Duration: 25 minutes

Data Security Across the Oil & Gas Value Chain

Connie Devine of Excelerate Energy and Danielle Jablanski of CISA explore critical infrastructure cybersecurity, key vulnerabilities across oil and gas operations, real-world attack case studies, and strategies for securing OT systems.

Price
Course duration Duration: 30 minutes

Managing the Expanding Attack Surface

Todd Pauley of Texas Education Agency, Stephen Cospolich of Charles Schwab and Reynaldo Gonzalez of Cummins discuss Attack Surface Management, continuous asset mapping and machine learning to identify vulnerabilities before attackers exploit them.

Price
Course duration Duration: 20 minutes

Mobility Without Vulnerability: Removing the Attack Vector

Wayne Lewandowski of Hypori explores eliminating mobile attack surfaces through virtual mobility infrastructure. Learn how streaming encrypted pixels enables device independence, zero trust security and cost-effective BYOD programs.

Price
Course duration Duration: 25 minutes

Navigating AI: LLM Security & Governance

Ronald Arden of Fasoo addresses LLM security challenges, safeguarding sensitive data and IP, understanding data lineage roles and developing modern governance frameworks to mitigate AI-amplified risks and ensure compliance.

Price
Course duration Duration: 30 minutes

The CISO's Critical Role in Nurturing Data Security

CISOs David Ginn of Johnson Controls, Andre Allen of ENGIE North America and Art Harvey of Dovenmuehle share strategies for comprehensive data protection, proactive incident response and AI-powered security analytics.

Price
Course duration Duration: 35 minutes

Uncovering Insider Threats With Behavioral Analytics

Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement