Summit Tracks

March 14, 2017 5:00am EDT
March 15, 2017 5:00am EDT
March 16, 2017 5:00am EDT

Featured Presenters

Kent Woodruff headshot

Kent Woodruff

Chief Security Officer


Srinivas Mukkamala headshot

Srinivas Mukkamala



Sushila Nair headshot

Sushila Nair

Principal Consultant

NTT Security

Fred Wilmot headshot

Fred Wilmot



Peter Wood headshot

Peter Wood


First Base Technologies

Steve Durbin headshot

Steve Durbin

Managing Director

ISF Ltd.

Recent Webinars

Only human: Redefining the User Security Experienc..

May 18, 2017 7:00am EDT

We’re often effective at handling replicable, deliberate security situations, but time and time again, human error has been the number...

Threat Hunting on Hadoop using Zeppelin Notebooks

March 16, 2017 5:00pm EDT

Join Daniel Smallwood, Sr. Security Engineer at Jask.IO for an interactive session on the key threat detection techniques on Hadoop....

Case Study: 6 Lessons Learned Hunting Advanced Cyb..

March 16, 2017 3:00pm EDT

What is it like to find out you’re on the trail of an advanced cyber criminal? What are the tools...

Black Will Be White – How Can We Benefit fro..

March 16, 2017 1:00pm EDT

Is it possible to do white box application security testing if all you have is executable files? Yes it is....

Leveraging DNS to Surface Attacker Activity

March 16, 2017 11:00am EDT

Sign up for our upcoming session on how to uncover advanced threats using DNS and data science, presented by Luis...

Cyber Attack Trends 2017 & Beyond: Protecting ..

March 16, 2017 9:00am EDT

As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled...

[Live Panel] Threat Hunters in Action

March 16, 2017 7:00am EDT

Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally...

Jenny Radcliffe – Threat Hunters in Action &..

March 16, 2017 5:00am EDT

For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part...

Top Trends in Critical Infrastructure Threats &..

March 15, 2017 5:00pm EDT

Critical infrastructure is the backbone of our nation's economy, security and health. As IoT/connected devices are becoming an integral element...

Why Hackers Keep Winning

March 15, 2017 4:00pm EDT

IDC predicts that one of every four people on Earth will be affected by a data breach by 2020. Yet...

Why Critical Infrastructure Cybersecurity Is In a ..

March 15, 2017 1:00pm EDT

It seems like it’s every other day the U.S. Government Accountability Office (GAO) is issuing a new critical infrastructure (CI)...

Would You Like to Hear the Story of the Connected ..

March 15, 2017 11:00am EDT

Jamison Utter and Sean Martin will have a 1:1 discussion about what the Internet of Things actually is. We’ll be...

7 Strategies for Dynamic Contract Management in th..

March 15, 2017 10:00am EDT

New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast,...

Securing the Migration to Industry 4.0

March 15, 2017 8:00am EDT

Digital Transformation, alongside European and country specific initiatives, liberalisation and competitive pressures, is transforming utilities, factories and critical infrastructure and...

What’s Next on the Corporate GRC Agenda?

March 15, 2017 7:00am EDT

The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made...

Optimise your business in the cloud without compro..

March 15, 2017 6:00am EDT

Data and security breaches related to cloud services and apps were much more widely reported in 2016. The increased use...

Avoiding Fear, Uncertainty & Doubt in Data Pro..

March 14, 2017 5:00pm EDT

As cyber attacks are gaining new levels of sophistication, velocity and impact, the need for awareness is growing at the...

2016 Malware Year in Review: Tricks, Threats, and ..

March 14, 2017 4:00pm EDT

In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable...

Beyond Files: The Full Spectrum of Attacks

March 14, 2017 3:00pm EDT

We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who...

Applying Attacker Profile Knowledge to Vulnerabili..

March 14, 2017 2:00pm EDT

With cyber attacks on the rise, how can we apply our knowledge about attackers into better protecting our organizations? There...

AI-Based Hacking and Defenses in a World of an Eve..

March 14, 2017 1:00pm EDT

The adoption of Internet of Things (IoT), Software-Defined Networks, and Microservices without proper security controls have created a broader attack...

Preventing Data Breaches with Software-Defined Net..

March 14, 2017 12:00pm EDT

As 2017 takes shape, network administrators and security specialists face an ever-expanding slate of hacker tricks and attempted breaches —...

The State of Cyber Defense in the Age of Hacks, Br..

March 14, 2017 11:00am EDT

Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers...

The Victim’s Perspective: What Makes Me a Ta..

March 14, 2017 10:00am EDT

SecureWorks’ incident responders assist hundreds of organisations annually with the containment and remediation of threats during security incidents, including both...

Availability 101: How to Defend against Cyber Atta..

March 14, 2017 8:00am EDT

With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a...

Hackers, Threats & Cyber Defence: Reporting fr..

March 14, 2017 7:00am EDT

Peter's presentation uses the latest research combined with experience from real-world client engagements to highlight current cyber threats. He describes...

How to Prevent Major Data Breaches with Faster Det..

March 14, 2017 6:00am EDT

“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches” according to Gartner...

[Live panel] Cyber Attack Trends and Staying One-s..

March 14, 2017 5:00am EDT

Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally...

Summit Sponsors

Related Summits

See all
December 5, 2017 11:00am EST

Industry experts will give their view on the future of Enterprise Architecture and how it is going to impact the...

October 17, 2017 11:00am EDT

From IT Ops teams managing on-premise hardware and servers, to fully-integrated off-premise cloud infrastructures, the transition to cloud ops is...

September 12, 2017 11:00am EDT

The explosion of container companies and technologies such as Docker have led to a new era of what it means...