Leading security experts share best-in-class strategies for keeping abreast of vulnerabilities, anticipating coming threats and baking security into a wide range of enterprise operations and applications.
View free thought leadership from top presenters, vendors and evangelists in IT Security in the form of live webinars, panel discussions, keynote presentations, and webcam videos.
Discover the latest solutions, strategies and tools to quickly and efficiently detect and respond to cyber threats.
Explore the latest tools for security management and learn from experts where best to focus your security budget and efforts.
Learn how to protect your company’s data and prevent privilege abuse by implementing security measures across throughout the application lifecycle.
A Special thank you to our Sponsors!
Diamond Sponsors






Platinum Sponsors


















Gold Sponsors


















In Partnership






ESG Keynote:
Outwit Attackers with a Proactive Cybersecurity Plan
Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But preventing such attacks has become increasingly challenging due to business factors like supporting the remote worker population, connecting IT to third-party partners, and developing new types of applications for digital transformation.…
Featured Panel Discussions
It’s Time to Modernize Threat Detection
Threats like malware and denial-of-service attacks have been around since the earliest days of the internet, and the cybersecurity industry has created generations of threat detection and response tools to identify and remediate them. As security threats continue to evolve and advance, the tools to identify and stop them need to evolve…
Update Your Application Security Strategy
Once considered an afterthought in software design, in today’s cloud-native, app-centric world, application security must be top of mind. Widespread applications usage over distributed and public networks invites a variety of potential threats. Frequent testing and adherence to application security best practices can limit the possibility of unauthorized code being used to…
Featured Presenters

Jon Oltsik
Senior Principal Analyst & Fellow
ESG

Stan Lowe
Chief Information Security Officer
Synchronoss Technologies

Jo Peterson
Vice President, Cloud & Security Services
Clarify360

Mark Orlando
Co-Founder and CEO
Bionic Cyber Inc.

Karen Stephens
Co-Founder and CEO
BCyber

Joseph Carrigan
Senior Security Engineer
Johns Hopkins University Information Security Institute

Ondrej Krehel
CEO & Founder
LIFARS

Natalie Timms
Security Operations Specialist
Cisco SECURE

Tanya Janca
Founder
We Hack Purple

Steve Cobb
Chief Information Security Officer
One Source Communications

John Bambenek
President
Bambenek Consulting

Melinda Marks
Senior Analyst
ESG

Matt Hathaway
Chief Strategy & Marketing Officer
TrueFort

Daniel Shugrue
Lead Product Marketer
Digital.ai

Cole Herzog
Engineering Manager
Digital.ai

Kristen Bell
Senior Manager, Application Security
GuidePoint Security

Jon Villanti
CISO
Allegiance Bank, CISSP

Andres Ruz
CISO
5 Factor Technology

Jonathan Jackson
Director, Sales Engineering APJ
BlackBerry

Mark Doering
Director, Technical Marketing
NETSCOUT

Joshua Hester
Executive Director of Information Security and Training Programs
CyberVista

Stephen Gates
Application Security Expert
Checkmarx

Immanuel Chavoya
PSIRT Operational Senior Manager
SonicWall

Sean Ryan
Sr. Principal, Product Marketing Manager
HackerOne

Chris Snell
Senior Solutions Architect
Cobalt Iron

Patrick Duffy
Senior Product Manager
Expel

Ray Pugh
Manager, Security Operations
Expel

Tony Lauro
Director Security Technology and Strategy
Akamai

Mukul Hinge
Group Product Marketing Manager, Security
Okta

Sonali Shah
Chief Product Officer
Invicti
Audience
CISOs, CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Advisors, Partners and Consultants within:
IT / IT Security / IT Operations
Network Security / Systems Engineering
Internal Audit / Compliance / IT Risk
Incident Response
Security / Information Security / Information Assurance
Data Privacy / Data Security
Cloud Security / Solutions Architecture
Identity Management
Cybersecurity / Cyber Intelligence
Product Management
Service Delivery
Breach / Threat Detection
Previous Speaking & Attending Companies
Pfizer, Netflix, Deutsche Bank, CoreSite, FedEx, Credit Suisse, Evolutio, BNP Paribas, Wells Fargo, Cox Communications, Energy Transfer, Chevron, Morgan Stanley, Infiltron Software Suite, Ingenico, US Government, BMO, JMSI Vision, Leeds Building Society
BAE Systems, FIS, Barclays, SecurityHQ, McAfee, Nokia, Booz Allen Hamilton, Walt Disney, Boeing, Bestel, Bosch, Schneider Electric, Ericsson, Cognigo, Vesta Corporation, YETI, MUFG, Capital One, Telenet, Trustwave, Lockheed Martin
LinkedIn, Deloitte, Accenture, BBVA, Kiewit, Volvo, Visa, Raytheon Technologies, Hitachi, Lenovo, LG Electronics, EY, US Air Force, Preqin, Aerospike, Adobe, Fiserv, US DOJ, Duke Energy, Capgemini, PwC, Bitconnect, Universal Computer Center, Federal Reserve
Northrop Grumman, Huawei Technologies, Ball Corporation, General Motors, Symantec, Kaiser Permanente, Samsung Electronics, Panasonic, Hilton, Repsol, General Dynamics, Ingenico, Finastra, Bank of America, Union Pacific Railroad, Nomura, Refinitiv, and more!