
9:00 am - 9:30 am

Registration & Exhibit Browsing

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.
All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.
April 27 & 28th 2021
Registering For a Group?
Call + 1 (609)-356-1499
Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?
Speaker:
Christopher Krebs, Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security
Speakers:
David Ogbolumani, Chief CyberSecurity & Privacy Officer, IT Security Consultants; former CISO, Kellogg CompanyKristin Judge, CEO, Cybercrime Support NetworkSadia Mirza, Attorney, Cybersecurity, Information Governance and Privacy Practice Group, Troutman Pepper
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their remote workforces, and now those risks are coming due.
Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
Randy Trzeciak, director of the CERT Insider Threat Center at Carnegie Mellon University, is one of the world's leading authorities on preventing, detecting, and responding to insider incidents. In this exclusive session, he details:
Speaker:
Patrick Vowles, Team Lead - North America Marketing, IBM Security
As organization adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. To do that they are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that really don't interoperate very well without a great deal of development work.
Join us to hear how a number of leading vendors are coming together with the intent of creating an open source platform to allow security solutions to communicate over a standard fabric during the entire threat management life cycle, from threat hunting, analytics and detection through to incident response and orchestration.
Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security
How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?
Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.
In his presentation, you'll learn:
Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.
Speaker:
Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7
Speaker:
Justin Fier, Director of Cyber Intelligence and Analytics, Darktrace
Though parts of the world are slowly transitioning back to 'normal', cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.
Join, Justin Fier - Director of Cyber Intelligence & Analytics, as he discusses how traditional cyber security tools are ill-equipped to protect today's dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings.
Don't miss this 20-minute webinar to discover how Cyber AI:
Speaker:
Sam Curry, Chief Security Officer, Cybereason
Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security
With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.
In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.
Key takeaways
Speaker:
Derek Gabbard, Field CTO, Fortinet
Speaker:
Sana Yousuf, Manager, Platform Solution Marketing, Cisco Systems, Inc.
Speakers:
Mike Huckaby, VP, Worldwide Sales Engineering, GigamonTimothy Rohrbaugh, CISO, JetBlue AirwaysTomas Maldonado, CISO, NFL
Speaker:
Mike Burr, Lead Android Enterprise Security Evangelist, Google
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Mike Burr of Google outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as utilizing the power of machine-learning that helps protect devices at the application layer.
Learn how Android has proved that open doesn't mean unsecure, with third party validation determining that the Android platform provides the most robust security features available to enterprise.
Speakers:
Katherine Licup, Chief Privacy Officer, Archer Daniels Midland CompanyTom Dager, CISO, Archer Daniels Midland Company
In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.
In this exclusive panel discussion, ADM CISO Tom Dager and CPO Katie Licup talk about their roles and how they are helping their global enterprise tackle:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismg.io