ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Middle East

May 19-20, 2021

Register Now

WELCOME / Summit Overview

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Rising security breaches and sophisticated cyberattacks across enterprises and critical industries in the Middle East and the government’s stringent regulations drive the need for new technologies and frameworks, with widespread COVID-19 pandemic.

Middle East organizations are now supporting a 100% remote workforce and embracing cloud, mobile, and edge computing. The increased adoption of ‘Cloud’ and its inherent challenges necessitates rewriting the cybersecurity framework’s principles with “zero trust” to develop the security architecture and redefining the role-based access control strategies and privacy regulations.

Join our virtual summit to gain expert insight from practitioners, researchers, and vendors on the myths and realities about ‘zero trust’ in addressing the cloud challenges in securing the ‘virtual’ enterprises.

Details

Free Registration

19 and 20 May 2021 at 8:30 am GST

Register Now
For queries, contact:
email at priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

Speakers Associated with ISMG

  • Event Gallery

Lt. Gen Rajesh Pant (Retd.), PVSM, AVSM, VSM, PhD

National Cybersecurity Coordinator - PMO, Govt. Of India

Ron Ross

Fellow, National Institute of Standards and Technology (NIST)

Tom Field

SVP, Editorial, ISMG

Rohit Ghai

President, RSA

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Sridhar Sidhu

EVP-Enterprise Information Security, Wells Fargo

Diana Kelley

Cybersecurity Field CTO, Microsoft

Chanranjit Singh Sodhi

Executive Director, Head of Identity & Access Management and BCM, Nomura Services India

PAST SPEAKERS

Dr. Reem AIShammari

CISO, Kuwait Oil Company and Co-founder, Women in Cyber Security Middle East (WiCSME)

Ziauddin Anees Ansari

Head of Cyber Security Defense Operations, in a Prominent Bank in UAE

Ahmed Baig

Founder, CISO Council, UAE

Tom Field

Senior Vice President, Editorial, ISMG

Suparna Goswami

Associate Editor, ISMG

Jeff Greene

Director, National Cybersecurity Center of Excellence, NIST

Varun Haran

Managing Director, Asia & Middle East, ISMG

Mustapha Huneyd

Director-Customer Security, Ericsson

Ahmad Mubarak

Sr Solutions Engineer, Shape Security (now part of F5)

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Dr. Erdal Ozkaya

Regional CISO & Managing Director, Standard Chartered Bank, UAE

Bharat Raigangar

GM - Business Head - India, Middle East, Africa CyberSecurity & Risk Services, Hon Advisor - ISACA UAE Board

Sagar Sethi

SVP & Head of Identity Governance and BCM-Group Security, First Abu Dhabi Bank

Keyur Shah

Senior Sales Engineer, Sophos

Nitin Shingari

Head-Information Security, Daman - National Health Insurance Company

David Temoshok

Senior Policy Advisor - Applied Cybersecurity, NIST IT Laboratory

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Draft Agenda / Session Date & Time



  • Wednesday, May 19th

  • Thursday, May 20th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
9:45 am
9:15 am - 9:45 am

Keynote Session: Cybersecurity 2021: Threats, Challenges and Strategies for the Middle East Enterprises

Speaker:
Dr. Reem AIShammari, CISO, Kuwait Oil Company and Co-founder, Women in Cyber Security Middle East (WiCSME)

COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation

The new information security model is open and fuzzy because the systems that we want to protect also must be open to the outside world. So we need a new security model and new cyber defenses that can help enterprises get "future-ready" to fight the "unknown, unknown" threats the remote workplace has ushered in.

This exclusive keynote session describes:

  • Changing threat landscape and lessons from the pandemic;
  • Key priorities for 2021 - identity, cloud, data protection, and regulations;
  • A collaborative approach to building skills and techniques to achieve "future-proof" enterprise security.
9:45 am -
10:30 am
9:45 am - 10:30 am

Plenary Session: Insider Threat: How to Mitigate the Heightened Risk

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model among enterprises.

Did you know that SASE helps bind the user's identity to the data context, the location, and the types of devices used to access the data to establish user authentication? Some say, CISOs now don't have to procure individual discrete security solutions and tie it into the network security layer; instead, they can source from one logical place using the SASE security model The adoption primarily is fuelled by the fact that SASE converges network capabilities and security functions by uniting "zero trust," SD-WAN, data loss prevention, cloud access security brokers, and more into a cohesive platform.

The session discusses:
  • Factors security teams need to evaluate when considering SASE adoption;
  • Why SASE is the next evolution for network security;
  • Why identity is paramount in the SASE model.
.
10:30 am -
10:45 am
10:30 am - 10:45 am

Tech Spotlight - A Holistic Approach to Cybersecurity in the Era of Digital Transformation

Speaker:
Keyur Shah, Senior Sales Engineer, Sophos

The challenges facing enterprises now are creating secure zones in data centers and cloud deployments, which allow companies to separate workloads and secure them individually while providing secure user access to the remote workforce.

Another task on hand for organizations is to advance the pace of innovation and embrace the latest security methodologies, as the business demands grow. How can you meet the business objectives by aligning your security strategy with a 'zero trust' model and how important the element of micro-segmentation is to provide secure access.

The session discusses:

  • How organizations can take a 'zero trust' approach;
  • How can 'zero trust' create process-level visibility?
  • How has micro-segmentation helped in the COVID-19 environment?
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Implementing 'Zero Trust': A CISO's Journey

Speaker:
Dr. Erdal Ozkaya , Regional CISO & Managing Director, Standard Chartered Bank, UAE

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The 'Zero Trust' model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a 'Zero Trust' architecture. This session provides a practical approach to adopting 'zero trust', outlining the strategy, the possibilities for leveraging existing investments, and the need for new investments.

The session discusses:

  • Improved privileged access management using 'Zero Trust';
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Essential steps for implementing 'Zero Trust' and stakeholder engagement.
10:45 am - 11:15 am Track B

Data Protection & Privacy Regulations: The Facts You Need to Know

Speaker:
Sagar Sethi, SVP & Head of Identity Governance and BCM-Group Security, First Abu Dhabi Bank

COVID-19 poses various data privacy challenges in the Middle East, for instance, regarding cost-related issues of ensuring the protection of the personal data and the hiring privacy professionals during the economic crisis. In its new data protection law, the government emphasizes enterprises to embed privacy considerations into their business models, considering investing in security and privacy programs.

There is a need for enterprises to understand the country's specific requirements in which they are operating, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.

The session discusses:

  • Different aspects of data protection laws that impact businesses;
  • Accountability for enterprises in hiring data protection officers;
  • Data breach notification - challenges and implications.
11:15 am -
11:30 am
11:15 am - 11:30 am

Expo Hall & Networking Break

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Redefining Your IAM Strategies to Secure the Remote Workplace

Speaker:
Mustapha Huneyd, Director-Customer Security, Ericsson

Managing and securing identities while accessing systems remotely and in the distributed era is big for today's enterprises. The fully remote or hybrid workforce is ensuring the right access policies and entitlements for employees and customers. Organizations must ensure that the IAM strategy for remote workforce embraces contextual authentication for measuring user risk profiles and establish a multifactor authentication mechanism. Revisiting and redefining the IAM policies for the current environment, which is tightly integrated with the PAM strategy to establish secure communication between teams, is critical for enabling the users' right access.

This session addresses:

  • How to apply a single sign-on strategy for better user access control;
  • The importance of privacy to IAM;
  • Improving identity governance and enhancing security posture with IAM.
11:30 am - 12:00 pm Track B

Building a Cyber Defense Center, Challenging the Status Quo

Speaker:
Ziauddin Anees Ansari, Head of Cyber Security Defense Operations, in a Prominent Bank in UAE

COVID-19 has transformed the entire threat landscape as enterprises are exposed to various threats and unprecedented risks. Experts say the pandemic has led to a 238% surge in cyberattacks against the banks, with almost 86% of the data breaches being financially motivated. Phishing, botnets, and mobile malware are topmost on the radar of the enterprises' threats with the most significant impact on organizational security.

There is a need for enterprises to invest in cyber defense centers to challenge the status quo of organizational security infrastructure in fighting these threats.

The session discusses:

  • Taking a holistic approach to building a cyber defense center to detect threats and anomalies;
  • How to reduce the breach identification time by leveraging appropriate skills;
  • Redefining the people, process, and technology components to build security resilience.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

NIST on Digital identity Authentication

Speaker:
David Temoshok, Senior Policy Advisor - Applied Cybersecurity, NIST IT Laboratory

In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:

The session discusses

  • Multi-factor authentication - what it is, why we need it;
  • Fast Identity Online (FIDO) Authenticators - strong authentication, easy to use;
  • Biometric authenticators -- secure or vulnerable?
12:00 pm - 12:30 pm Track B

NIST on Home Office Security

Speaker:
Jeff Greene, Director, National Cybersecurity Center of Excellence, NIST

The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:

  • How NIST approached remote deployment;
  • Lessons learned about telework;
  • How to secure virtual meetings.
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm

The Evolution of Application Security

Speaker:
Ahmad Mubarak, Sr Solutions Engineer, Shape Security (now part of F5)

While organizations and individuals continue to mobilize in an attempt to mitigate the global disruptions taking place around them, cybercriminals have wasted no time in exploiting the COVID-19 pandemic. Today, attackers and fraudsters call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware - all designed to defeat traditional defenses such as WAFs & CAPTCHAs. This session will dive deeper into how organizations can keep pace with this precipitate shift and adjust their security postures accordingly, to more accurately reflect the realities of an ever-evolving threat landscape.

  • Understand how organizations can keep pace with this precipitate shift and adjust their security postures accordingly;
  • Navigate the automated application attack-roadmap from the commodification of Credential Stuffing and ATO schemes to some of the most cutting-edge examples of Manual Fraud capability;
  • Evaluate how organizations can better protect their customers and brand without compromising user experience or collecting PII.
1:15 pm -
2:00 pm
1:15 pm - 2:00 pm

Panel Discussion: COVID 19 & Beyond: Cybersecurity Outlook for 2021

Speakers:
Bharat Panchal, CRO, India, ME & Africa, FIS Global
Kiran Belsekar, Vice President- Information Security, Aegon Life
Ninad Chavan, CISO, Edelweiss GIC

These cybersecurity threats are amplified by the ongoing pandemic in the Middle East region, increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.

A panel of experts discuss:

  • Risks posed by increased digitization and cloud disruption;
  • Use of the right technologies and tools for enhanced security posture;
  • Use of predictive analytics and active defense in detecting threats;
  • Cybersecurity investments in 2021.
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:15 am
9:00 am - 9:15 am

Opening Remarks

9:15 am -
9:45 am
9:15 am - 9:45 am

Keynote Session: Cybersecurity 2021: Threats, Challenges and Strategies for the Middle East Enterprises

Speaker:
Dr. Reem AIShammari, CISO, Kuwait Oil Company and Co-founder, Women in Cyber Security Middle East (WiCSME)

COVID-19 has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with securing a new hybrid workforce and defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation

The new information security model is open and fuzzy because the systems that we want to protect also must be open to the outside world. So we need a new security model and new cyber defenses that can help enterprises get "future-ready" to fight the "unknown, unknown" threats the remote workplace has ushered in.

This exclusive keynote session describes:

  • Changing threat landscape and lessons from the pandemic;
  • Key priorities for 2021 - identity, cloud, data protection, and regulations;
  • A collaborative approach to building skills and techniques to achieve "future-proof" enterprise security.
9:45 am -
10:30 am
9:45 am - 10:30 am

Plenary Session: Insider Threat: How to Mitigate the Heightened Risk

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model among enterprises.

Did you know that SASE helps bind the user's identity to the data context, the location, and the types of devices used to access the data to establish user authentication? Some say, CISOs now don't have to procure individual discrete security solutions and tie it into the network security layer; instead, they can source from one logical place using the SASE security model The adoption primarily is fuelled by the fact that SASE converges network capabilities and security functions by uniting "zero trust," SD-WAN, data loss prevention, cloud access security brokers, and more into a cohesive platform.

The session discusses:
  • Factors security teams need to evaluate when considering SASE adoption;
  • Why SASE is the next evolution for network security;
  • Why identity is paramount in the SASE model.
.
10:30 am -
10:45 am
10:30 am - 10:45 am

Tech Spotlight - A Holistic Approach to Cybersecurity in the Era of Digital Transformation

Speaker:
Keyur Shah, Senior Sales Engineer, Sophos

The challenges facing enterprises now are creating secure zones in data centers and cloud deployments, which allow companies to separate workloads and secure them individually while providing secure user access to the remote workforce.

Another task on hand for organizations is to advance the pace of innovation and embrace the latest security methodologies, as the business demands grow. How can you meet the business objectives by aligning your security strategy with a 'zero trust' model and how important the element of micro-segmentation is to provide secure access.

The session discusses:

  • How organizations can take a 'zero trust' approach;
  • How can 'zero trust' create process-level visibility?
  • How has micro-segmentation helped in the COVID-19 environment?
10:45 am -
11:15 am
10:45 am - 11:15 am Track A

Implementing 'Zero Trust': A CISO's Journey

Speaker:
Dr. Erdal Ozkaya , Regional CISO & Managing Director, Standard Chartered Bank, UAE

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The 'Zero Trust' model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a 'Zero Trust' architecture. This session provides a practical approach to adopting 'zero trust', outlining the strategy, the possibilities for leveraging existing investments, and the need for new investments.

The session discusses:

  • Improved privileged access management using 'Zero Trust';
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • Essential steps for implementing 'Zero Trust' and stakeholder engagement.
10:45 am - 11:15 am Track B

Data Protection & Privacy Regulations: The Facts You Need to Know

Speaker:
Sagar Sethi, SVP & Head of Identity Governance and BCM-Group Security, First Abu Dhabi Bank

COVID-19 poses various data privacy challenges in the Middle East, for instance, regarding cost-related issues of ensuring the protection of the personal data and the hiring privacy professionals during the economic crisis. In its new data protection law, the government emphasizes enterprises to embed privacy considerations into their business models, considering investing in security and privacy programs.

There is a need for enterprises to understand the country's specific requirements in which they are operating, with the enactment of data protection law in the region, whether there are established data protection laws and what standards of data protection should be applied.

The session discusses:

  • Different aspects of data protection laws that impact businesses;
  • Accountability for enterprises in hiring data protection officers;
  • Data breach notification - challenges and implications.
11:15 am -
11:30 pm
11:15 am - 11:30 pm

Expo Hall & Networking Break

11:30 am -
12:00 pm
11:30 am - 12:00 pm Track A

Redefining Your IAM Strategies to Secure the Remote Workplace

Speaker:
Mustapha Huneyd, Director-Customer Security, Ericsson

Managing and securing identities while accessing systems remotely and in the distributed era is big for today's enterprises. The fully remote or hybrid workforce is ensuring the right access policies and entitlements for employees and customers. Organizations must ensure that the IAM strategy for remote workforce embraces contextual authentication for measuring user risk profiles and establish a multifactor authentication mechanism. Revisiting and redefining the IAM policies for the current environment, which is tightly integrated with the PAM strategy to establish secure communication between teams, is critical for enabling the users' right access.

This session addresses:

  • How to apply a single sign-on strategy for better user access control;
  • The importance of privacy to IAM;
  • Improving identity governance and enhancing security posture with IAM.
11:30 am - 12:00 pm Track B

Building a Cyber Defense Center, Challenging the Status Quo

Speaker:
Ziauddin Anees Ansari, Head of Cyber Security Defense Operations, in a Prominent Bank in UAE

COVID-19 has transformed the entire threat landscape as enterprises are exposed to various threats and unprecedented risks. Experts say the pandemic has led to a 238% surge in cyberattacks against the banks, with almost 86% of the data breaches being financially motivated. Phishing, botnets, and mobile malware are topmost on the radar of the enterprises' threats with the most significant impact on organizational security.

There is a need for enterprises to invest in cyber defense centers to challenge the status quo of organizational security infrastructure in fighting these threats.

The session discusses:

  • Taking a holistic approach to building a cyber defense center to detect threats and anomalies;
  • How to reduce the breach identification time by leveraging appropriate skills;
  • Redefining the people, process, and technology components to build security resilience.
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

NIST on Digital identity Authentication

Speaker:
David Temoshok, Senior Policy Advisor - Applied Cybersecurity, NIST IT Laboratory

In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:

The session discusses

  • Multi-factor authentication - what it is, why we need it;
  • Fast Identity Online (FIDO) Authenticators - strong authentication, easy to use;
  • Biometric authenticators -- secure or vulnerable?
12:00 pm - 12:30 pm Track B

NIST on Home Office Security

Speaker:
Jeff Greene, Director, National Cybersecurity Center of Excellence, NIST

The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:

  • How NIST approached remote deployment;
  • Lessons learned about telework;
  • How to secure virtual meetings.
12:30 pm -
12:45 pm
12:30 pm - 12:45 pm

Networking break

12:45 pm -
1:15 pm
12:45 pm - 1:15 pm

The Evolution of Application Security

Speaker:
Ahmad Mubarak, Sr Solutions Engineer, Shape Security (now part of F5)

While organizations and individuals continue to mobilize in an attempt to mitigate the global disruptions taking place around them, cybercriminals have wasted no time in exploiting the COVID-19 pandemic. Today, attackers and fraudsters call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware - all designed to defeat traditional defenses such as WAFs & CAPTCHAs. This session will dive deeper into how organizations can keep pace with this precipitate shift and adjust their security postures accordingly, to more accurately reflect the realities of an ever-evolving threat landscape.

  • Understand how organizations can keep pace with this precipitate shift and adjust their security postures accordingly;
  • Navigate the automated application attack-roadmap from the commodification of Credential Stuffing and ATO schemes to some of the most cutting-edge examples of Manual Fraud capability;
  • Evaluate how organizations can better protect their customers and brand without compromising user experience or collecting PII.
1:15 pm -
2:00 pm
1:15 pm - 2:00 pm

Panel Discussion: COVID 19 & Beyond: Cybersecurity Outlook for 2021

Speakers:
Bharat Panchal, CRO, India, ME & Africa, FIS Global
Kiran Belsekar, Vice President- Information Security, Aegon Life
Ninad Chavan, CISO, Edelweiss GIC

These cybersecurity threats are amplified by the ongoing pandemic in the Middle East region, increasing phishing attacks, targeted attacks, disruption, distortion, and deterioration. The emergence of technologies such as IoT, skill shortage, insider threats, and cloud movement has posed the most significant risks.

A panel of experts discuss:

  • Risks posed by increased digitization and cloud disruption;
  • Use of the right technologies and tools for enhanced security posture;
  • Use of predictive analytics and active defense in detecting threats;
  • Cybersecurity investments in 2021.
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Expo Hall and Networking

View Schedule

PAST SPONSORS / Past Summit Sponsors

Shape security
Sophos
CISO COUNCIL
ISACA UAE
CyberEd Board

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

LOCATION / Venue & Address

Virtual Summit

Register and attend online.

Live presentations, Q&A, and Expo Hall demos will be held May 19th. All recordings will be available the 2 days following the summit.

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now
For queries, contact:
email at priti.dutta@ismg-summits.com / mahesh.verma@ismg-summits.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data