Leading security experts share best-in-class strategies for keeping abreast of vulnerabilities, anticipating coming threats and baking security into a wide range of enterprise operations and applications.
View free thought leadership from top presenters, vendors and evangelists in IT Security in the form of live webinars, panel discussions, keynote presentations, and webcam videos.
Discover the latest solutions, strategies and tools to quickly and efficiently detect and respond to cyber threats.
Explore the latest tools for security management and learn from experts where best to focus your security budget and efforts.
Learn how to protect your company’s data and prevent privilege abuse by implementing security measures across throughout the application lifecycle.
A Special thank you to our Sponsors!
Diamond Sponsors
Platinum Sponsors
Gold Sponsors
In Partnership
ESG Keynote:
Outwit Attackers with a Proactive Cybersecurity Plan
Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But preventing such attacks has become increasingly challenging due to business factors like supporting the remote worker population, connecting IT to third-party partners, and developing new types of applications for digital transformation.…
Featured Panel Discussions
It’s Time to Modernize Threat Detection
Threats like malware and denial-of-service attacks have been around since the earliest days of the internet, and the cybersecurity industry has created generations of threat detection and response tools to identify and remediate them. As security threats continue to evolve and advance, the tools to identify and stop them need to evolve…
Update Your Application Security Strategy
Once considered an afterthought in software design, in today’s cloud-native, app-centric world, application security must be top of mind. Widespread applications usage over distributed and public networks invites a variety of potential threats. Frequent testing and adherence to application security best practices can limit the possibility of unauthorized code being used to…
Featured Presenters
Jon Oltsik
Senior Principal Analyst & Fellow
ESG
Stan Lowe
Chief Information Security Officer
Synchronoss Technologies
Jo Peterson
Vice President, Cloud & Security Services
Clarify360
Mark Orlando
Co-Founder and CEO
Bionic Cyber Inc.
Karen Stephens
Co-Founder and CEO
BCyber
Joseph Carrigan
Senior Security Engineer
Johns Hopkins University Information Security Institute
Ondrej Krehel
CEO & Founder
LIFARS
Natalie Timms
Security Operations Specialist
Cisco SECURE
Tanya Janca
Founder
We Hack Purple
Steve Cobb
Chief Information Security Officer
One Source Communications
John Bambenek
President
Bambenek Consulting
Melinda Marks
Senior Analyst
ESG
Matt Hathaway
Chief Strategy & Marketing Officer
TrueFort
Daniel Shugrue
Lead Product Marketer
Digital.ai
Cole Herzog
Engineering Manager
Digital.ai
Kristen Bell
Senior Manager, Application Security
GuidePoint Security
Jon Villanti
CISO
Allegiance Bank, CISSP
Andres Ruz
CISO
5 Factor Technology
Jonathan Jackson
Director, Sales Engineering APJ
BlackBerry
Mark Doering
Director, Technical Marketing
NETSCOUT
Joshua Hester
Executive Director of Information Security and Training Programs
CyberVista
Stephen Gates
Application Security Expert
Checkmarx
Immanuel Chavoya
PSIRT Operational Senior Manager
SonicWall
Sean Ryan
Sr. Principal, Product Marketing Manager
HackerOne
Chris Snell
Senior Solutions Architect
Cobalt Iron
Patrick Duffy
Senior Product Manager
Expel
Ray Pugh
Manager, Security Operations
Expel
Tony Lauro
Director Security Technology and Strategy
Akamai
Mukul Hinge
Group Product Marketing Manager, Security
Okta
Sonali Shah
Chief Product Officer
Invicti
Audience
CISOs, CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Advisors, Partners and Consultants within:
IT / IT Security / IT Operations
Network Security / Systems Engineering
Internal Audit / Compliance / IT Risk
Incident Response
Security / Information Security / Information Assurance
Data Privacy / Data Security
Cloud Security / Solutions Architecture
Identity Management
Cybersecurity / Cyber Intelligence
Product Management
Service Delivery
Breach / Threat Detection
Previous Speaking & Attending Companies
Pfizer, Netflix, Deutsche Bank, CoreSite, FedEx, Credit Suisse, Evolutio, BNP Paribas, Wells Fargo, Cox Communications, Energy Transfer, Chevron, Morgan Stanley, Infiltron Software Suite, Ingenico, US Government, BMO, JMSI Vision, Leeds Building Society
BAE Systems, FIS, Barclays, SecurityHQ, McAfee, Nokia, Booz Allen Hamilton, Walt Disney, Boeing, Bestel, Bosch, Schneider Electric, Ericsson, Cognigo, Vesta Corporation, YETI, MUFG, Capital One, Telenet, Trustwave, Lockheed Martin
LinkedIn, Deloitte, Accenture, BBVA, Kiewit, Volvo, Visa, Raytheon Technologies, Hitachi, Lenovo, LG Electronics, EY, US Air Force, Preqin, Aerospike, Adobe, Fiserv, US DOJ, Duke Energy, Capgemini, PwC, Bitconnect, Universal Computer Center, Federal Reserve
Northrop Grumman, Huawei Technologies, Ball Corporation, General Motors, Symantec, Kaiser Permanente, Samsung Electronics, Panasonic, Hilton, Repsol, General Dynamics, Ingenico, Finastra, Bank of America, Union Pacific Railroad, Nomura, Refinitiv, and more!