
9:00 am - 9:30 am

Registration & Exhibit Browsing

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Even the most forward-looking organizations face added breach risk in these extraordinary times. Layers of security are rendered useless if your new remote workforce, or vulnerabilities in their devices and networks, inadvertently give permission for threat actors to access your data.
Join experts in the field at our virtual summit to learn how to best adapt and balance productivity, accessibility and security.
Same agenda:
July 21st, 22nd, & 23rd
Registering For a Group?
Call + 1 (609)-356-1499
Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency
Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.
Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA
RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:
Speaker:
Gerald Beuchelt, CISO, LogMeIn
As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.
Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:
Speakers:
Jony Fischbein, CISO, Check PointRebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.aiStephen Fridakis, Technical Program Manager, Security - M&A, Google
You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?
Join this exclusive panel of current and former CISOs for insight on:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:
Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam
Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:
Speaker:
Steve Porcello, Senior Security Engineer, Gigamon
As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.
Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLPRonald Raether, Partner, Partner at Troutman Pepper
Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:
Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency
Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.
Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA
RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:
Speaker:
Gerald Beuchelt, CISO, LogMeIn
As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.
Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:
Speakers:
Jony Fischbein, CISO, Check PointRebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.aiStephen Fridakis, Technical Program Manager, Security - M&A, Google
You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?
Join this exclusive panel of current and former CISOs for insight on:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:
Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam
Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:
Speaker:
Steve Porcello, Senior Security Engineer, Gigamon
As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.
Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLPRonald Raether, Partner, Partner at Troutman Pepper
Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:
Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency
Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.
Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA
RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:
Speaker:
Gerald Beuchelt, CISO, LogMeIn
As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.
Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:
Speakers:
Jony Fischbein, CISO, Check PointRebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.aiStephen Fridakis, Technical Program Manager, Security - M&A, Google
You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?
Join this exclusive panel of current and former CISOs for insight on:
Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:
Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam
Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:
Speaker:
Steve Porcello, Senior Security Engineer, Gigamon
As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.
Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLPRonald Raether, Partner, Partner at Troutman Pepper
Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:
Register and attend online.
Live presentations, speaker Q&A, and Expo Hall demos will all be held on our virtual platform.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com