Live streamed content Includes live panels, analyst briefings on industry trends, CISOs Only Hour and more. DATES: TBA
Thought Leadership panels: select from the following (multiple is okay*)
Lock Down Your Transactions with financial API fortification!
API Security Governance: Policies and Compliance Requirements
Third Party API Security
Techniques and Tools for Comprehensive API Assessment
Feeling Uneasy? Safeguard Your Serverless APIs!
Speed Bumps, Not Roadblocks: API Rate Limiting for Secure Flow
Standard Shield: OWASP API Security Top 10 as Your Guide
IoT: Insecure or Trustworthy? Navigating API Security in the Internet of Things
API Rate Limiting for Secure Flow think Speed Bumps, Not Roadblocks!
Comparing Token-based, JWT, and HMAC Authentication Methods
Firewall for APIs: Building Strong Defenses Against Digital Invaders
The Ultimate Identity Crisis! API and Identity and Access Management
Software Supply Chain Security – Managing 3rd party and Open Source Risk
Security Consolidation: Simpler Is Better As We Become Overloaded With Data
AI Powered Automated Security Capabilities: Next Level or Hype?
Secure Coding: Testing Code for Vulnerabilities
Maintaining App/API Security throughout the entire Software Lifecycle---for real
App Scanning: Is it Effective?
Retooling for the Cloud: As AppDev moves to the cloud our tools need to adapt
IaaC: Securing Infrastructure thats not there
Cloud Native Security: Are we utilizing it as much as we should be?
IoT Security - We're still not in a good place
Data breaches: You've been compromised, they may have exfiltrated data, now what?
Mobile protection: Securing your data when it's in the hands of your users and moving around
Is DLP dead? How will we protect data in the future?
Data labeling and classification: What are the elements of a successful program?
Social Engineering and Your Data: Evolving Sophistication Requires Vigilance
Removeable Media and Data Exfiltration
Data Encryption: When, Where, and How?
Backup and recovery: Are we doing enough to ensure that we can quickly recover from a significant event?
Logging for applications: What should we be capturing and how much is too much?
Physical data security: The often overlooked aspect of securing data
Data leaks in mobile apps: Are you checking for them and dealing with discovered issues?
Secure passwords: Proper complexity and enforcing change intervals are key to keeping your data safe
The Evolution of GRC: Trends and Future Directions
Integrating GRC into Corporate Strategy
Technology and GRC: Leveraging AI and Automation
Cybersecurity Risk Management: A GRC Perspective
Regulatory Compliance in a Global Environment
Data Privacy and Protection: Challenges and Solutions
The Role of the Board in GRC Oversight
Risk Assessment Methodologies: Best Practices and Innovations
Crisis Management and Business Continuity Planning
Ethics and Compliance: Building a Culture of Integrity
Third-Party Risk Management: Strategies for Success
Measuring GRC Effectiveness: Metrics and KPIs
The Impact of ESG (Environmental, Social, and Governance) on GRC
Training and Awareness: Fostering a GRC Mindset Across the Organization
Challenges in Implementing a GRC Framework: Lessons Learned
Mice In The Basement: The Manufacturing Floor Provides A Place for Malicious Actors To Hide and Pivot in the Open and Unchallenged
Our Legacy: Obsolete Machinery, Legacy OS's and the Challenge of Keeping Them Safe
Staring Into The Sun: Lack of Visibility into IoT/OT Systems
Head In The Clouds: The Need To Pipe OT Data into the Cloud Creates a New Set Of Challenges
Managing Risk from Your Vendors and Suppliers
Who's On First ? Navigating IoT/OT Security When Ownership is Not Homogeneous
Segregating No Longer Works: Network Architecture Attrition and Redesign Is Necessary
What I Don't Know CAN Hurt Me: Finding and Securing Rogue Devices
Radio Play: The Role of Signal Intelligence in Knowing What is Talking On Your Network
Standards? Who Needs Standards: The Challenges of IoT Devices and Lack of Standardization
Unintentional Accomplice: IoT Bots and DDoS Attacks Utilizing MY Devices to Attack?
OT Challenges: Securing Devices That Aren't Able To Run Security Tools Natively
Zero Trust Architecture: Rethinking Network Security
Securing Remote Work: Challenges and Best Practices
The Role of Artificial Intelligence in Network Security
Network Segmentation: Best Practices for Reducing Risk
The Impact of IoT on Network Security
Compliance and Regulatory Requirements in Network Security
The Future of Network Security: Trends and Innovations
Third-Party Risk Management in Network Security
The Role of Encryption in Network Security
The Intersection of Network Security and DevSecOps
Behavioral Analytics in Network Security
Network Security in a Multi-Cloud Environment
The Role of Governance in Network Security
The Role of Firewalls and Intrusion Detection Systems
Discussing strategies for identifying and preventing insider threats to network security.
The Role of Blockchain in Enhancing Network Security
Building an Effective Security Operations Center (SOC)
Incident Response: Best Practices for SecOps Teams
Threat Hunting: Proactive Defense Strategies
Automation in SecOps: Streamlining Processes and Enhancing Efficiency
The Role of Artificial Intelligence and Machine Learning in SecOps
Collaboration Between SecOps and DevSecOps
Metrics and KPIs for Measuring SecOps Effectiveness
Managing Security Alerts: Prioritization and Triage
The Importance of Continuous Monitoring and Threat Intelligence
Cybersecurity Compliance and SecOps: Meeting Regulatory Requirements
Incident Post-Mortems: Learning from Security Breaches
SecOps in a Cloud Environment: Challenges and Solutions
The Future of SecOps: Trends and Innovations
Third-Party Risk Management: SecOps Considerations
Dealing with Insider Threats: SecOps Strategies
Cross-Organizational Collaboration: SecOps and IT Operations
The Role of Forensics in SecOps
Security Awareness: Engaging Employees in SecOps
Predictive Analytics for Anticipating Cyber Attacks
Automated Threat Hunting with Advanced Analytics
Enhancing SOC Efficiency with Behavioral Analytics
Future Trends in Cybersecurity Analytics: Quantum Computing and Beyond
UEBA for Insider Threat Prevention: Strategies and Challenges
Collaborative Intelligence: Blending UEBA with Human Expertise for Enhanced Cybersecurity
The Role of Security Analytics in Cyber Threat Detection
Leveraging Big Data for Enhanced Security Analytics
Integrating Security Analytics with SIEM Solutions
Machine Learning in Security Analytics: Opportunities and Challenges
Behavioral Analytics: Detecting Anomalies and Insider Threats
Real-Time vs. Historical Data Analysis in Security Analytics
The Importance of Data Quality in Security Analytics
Incident Response and Security Analytics: A Data-Driven Approach
Threat Intelligence Integration: Enhancing Security Analytics
Security Analytics in the Cloud: Challenges and Solutions
Privacy Considerations in Security Analytics
Automating Security Analytics: Benefits and Limitations
Quantifying Risk with Security Analytics
Security Analytics for Compliance and Regulatory Requirements
Challenges in Scaling Security Analytics Solutions
The Role of Open Source Tools in Security Analytics
Intelligence & Sharing, A Paradigm Shift: Threat Informed Defense
Supply Chain: Managing the Risk Brought By Your Suppliers
Homogonization and Utilization of Multiple Threat Feeds
The Role of ISAC's, ISAO's, CERT's, etc. in the Cybersecurity Space
TI Teams Creating Content for other teams (Rick Holland)
Career Pathing in Threat Intelligence (Rick Holland)
Threat Intel as a Service – now what do I do with the information?
IoCs and Managing My Risk
Predictive Intelligence and AI and Automation to the Rescue?
Threat Intelligence Frameworks: Do We Need One?
Threat Intelligence Sharing: We Are Stronger Together!
Moving to the Cloud: Manage Risk When You Don’t Own The Platform
Continue below and submit
Drilldown Panels: (non vendors & SPONSORING VENDORS only) (multiple okay)
AI in Cybersecurity products: Marketing hype or reality?
How does AI REALLY change how we work?
Is AI as we know it today really "Intelligent" or is it nothing more than automation meets big data analytics?
AI Solutions: Buy or Build?
Protecting the AI Model: Adversarial Input, Data Poisoning, Model Stealing, etc; How do we protect the model itself from attack?
Supervised Learning, Unsupervised Learning, or Reinforcement Learning: Which is the right model for me?
How much data is enough to make the use of AI truly valuable, and do I have enough?
What does the introduction of AI mean to the Cybersecurity industry?
As Cybercriminals begin to use AI and Automation in attacks, how do we ramp up our response to combat the increased speed of attack?
How do you protect internal secrets from discovery and propagation via AI?
Is DSPM the answer to inadequate Data Security management tools?
Teamwork: The Importance of Internal Audit, GRC, Legal, and Security for Successful Data Governance
Zero Trust and DSPM
AI and DSPM, Perfect Together
CSPM and DSPM, is it Time To Converge?
Can't Protect What I Can't Find: Discovering Data, Attack Paths, and Blocking Them
A Storm Is Brewing: Multi-Cloud Environments, Data Everywhere, Unknown Tenants and Assets... How Do I Locate and Manage My Data?
"Shadow Data" In My Cloud
The Evolution of Data Security Methodologies in Changing Environments
Missed Connections: Secure Access Global Access Networks and Aligning with Business Needs
Get Smart: Agents Everywhere!
IoC's to Monitor for Secure Access Security
Integrating Secure Access Products with Security Policies
Walking a Tightrope: Customer Experience versus Security, making it secure and work well
SSE or SASE, Which is Right For Me?
Build or Buy?
Should I manage Access, or Outsource Management?
Developing a SASE Strategy
Should my Secure Access Solution Integrate with existing products, or stand alone?
Protecting against malicious code
Securing APIs
Secure software development framework and Secure by Design
Components for securing the Software Supply Chain
SBOMs: The increasing need to have complete and correct Bill of Materials for all of your software
Incident Response Plan: How do you react when the breach is not yours?
Monitoring Suppliers: Extending the reach of your monitoring capabilities to your suppliers
The Importance of Access Control when 3rd parties are involved
Software Supply Chain Compliance: The challenge of managing compliance when it's not your organization
Securing the Development and Delivery Infrastructure: Managing 3rd Party patching and negotiation remediation priority
Protecting Against Malicious Code
Feeling insecure? The push for transparency from software vendors
Code Ninja Secrets: Stealthy Defense Against Reverse Engineering
The Future of Mobile App Security: Emerging Technologies and Trends
Hacking the Hackers: Pen Testing for Mobile Apps
Mitigating threats from unsecured Mobile Apps. Real world examples and a few hypotheticals
Data Fort Knox- Protecting Your Apps Most Valuable Asset
Mobile Bot Management: Strategies for Stopping Automated Attacks on Your App
"Hey, Mobile—AI and ML are coming for you!" Keeping up with the Mobile app threat landscape
Account Takeover Prevention
Empowering Users through Mobile Security
Building a Secure Mobile Payment Ecosystem: Best Practices for Fraud Prevention
Compliance Conundrum: Navigating the Mobile App Security Rulebook
Data Protection in the Mobile World: Encrypting Your Data and Protecting User Privacy
Changing Times: A Shift From Securing The Network to Securing The Browser
Preventing Escalation With Segmentation of Sessions
The Future of Work Runs Through the Web Browser
Case Study: TBD
What is Browser Security and Why Do I Need One?
The Case for Browser Security: Hybrid Work and Rising Numbers of Browser-Based Attacks Require a New Solution
Browser Workload Containerization: The Future of Secure Browsing
TCase Study: TBD
Email Spoofing: Why Is This Still A Thing?
Phishing for Gold: Sophisticated MFA Proxy Attacks through Email Bypass Legitimate MFA Controls
Chumming The Water: Phishing Targets Vendors and Customers as a Means to Gain Access to Your Systems from Legitimate Sources
Why is Phishing still so successful today?
Email is Still the Primary Gateway For Your Ransomeware Infiltration
Cleaning and Containerization: Are These the Answer for Dealing with Attachments Safely?
Know Your Sender... DMARC and DKIM: So Simple, Yet Still Underutilized
Dark Web and Email: Correlating Threat Intelligence and TTP to Craft Email Protection Mechanisms
Experience from the field, what a successful migration to Passwordless looks like
AI and Authentication, what does the future hold?
Cloud, on-prem, mobile, IoT, remote workforce: Authentication Challenges in our new Hybrid World
Authentication and Zero Trust: Perfect Together
The future of MFA
Passwordless Authentication: How do we get there?
What does Phishing Resistant MFA Mean?
Utilizing FIDO to replace SAML in Authentication
Mitigating MFA Security Vulnerabilities by implementing FIDO
State Factors: The rise of Government issued 'Self Sovereign Identifiers' and other electronic identifiers
Enhancing Cryptographic Authentication by Adding a Second Factor to protect against credential device compromise
Do we need air traffic control? Who is controlling our airspace?
Software Defined Radio (SDR) threats, a deeper look
The hidden supply chain risks with 5G
Rogue cell towers, a deeper dive
The intersection of IoT/OT and Wireless Network Security, why patrolling the airwaves is so critical to device security.
Wi-Fi 7 is finally here! Now what?
Wireless SOCaaS, an innovative service offering worth a look
Implementing Zero Trust in Wireless Networks, barriers and best practices
AI evolution in Wireless Networks, threats and opportunities
Shadow IoT, hidden threats on unmanaged wireless networks
SecOps Best Practices: Going beyond non-attributable network to support modern digital investigations
Trust and Safety in Digital Investigations, who's watching the watchers?
Anonymity online: How your digital footprint gets leaked during investigations
Why digital investigations take so long, and how to speed it up
Digital evidence collection: Why screenshots aren't enough
The Dark Web: What's new?
Observability vs. SIEM, will they converge into one?
The evolution and future of Algorithms in Cyber Threat Detection and what's next?
SIEM, SOAR and XDR: How do we integrate them all into a cohesive strategy?
Building a Scalable SIEM Architecture for Growing Data Volumes
Cloud and SaaS-based EDR, NDR, and other security tools, can we control data sprawl?
SIEM in the Cloud: Challenges and Opportunities
SaaS Security Posture Management (SSPM): Navigating the Landscape
Securing Hybrid Workforce Access: Strategies and Impact
Protecting the keys to the kingdom: Encryption key management in SaaS
Is it time for Multi-SaaS Strategies?
The Evolving Landscape of SaaS Security Standards and Certifications
Preparing for the Worst: Incident Response across SaaS environments
The Future of Identity and Access Management in SaaS Ecosystems
How does CASB fit in the overall SaaS security strategy and how to get the most out of the capabilities
SaaS Risks: Beyond DLP
Future Trends in SaaS Security
Ransomware Threats to SaaS Applications: Mitigation and Response Strategies
What You Don't Know Can Hurt You: Managing your SaaS Attack Surface
Mobile: the Giant Blind Spot in Cyber. Why and what’s to be done?
Mastering Mobile App Authentication
Protecting Your App from Zero-Day Attacks and Advanced Threats
Hey, mobile—AI and ML are coming for you! Keeping up with the mobile app threat landscape
Permissions Patrol: Taming the Wild West of App Permissions
The Mobile Malware Landscape: Understanding the Different Types of Threats
Mobile App Security in the Age of Remote Work: Mitigating Risks in Distributed Environments
Dynamic Instrumentation and Script Injection: Protecting Your App from Code Injection Attacks
AI Avengers: How Artificial Intelligence Is Safeguarding Mobile Apps
The Rise of Mobile Cheating: How Hackers Gain Unfair Advantage in Mobile Games
Biometric Beat: Dancing Between Convenience and Security in Mobile Apps
Memory Editing and Patching Prevention: Protecting Your Mobile Game from Cheats
Ghost Mode! Mobile App Security Without Sacrificing Privacy
Leveraging Tools and Technologies for Efficiency: Automation at it's Finest!
Cloud Security Posture Management and it's Relationship with ASPM
Integrating Security into the Development Lifecycle: DevSecOps
ASPM Beyond Basics: Strategies for Smarter, Stronger App Security
Security Scorecard Reporting: Metrics and KPIs
The role of AI and Machine Learning in Enhancing ASPM
Sealing Secrets with ASPM- Container Conquests!
Code Like a Pro: Fortify Your Apps with Secure Coding and ASPM
Elevate Your Application Security Posture with Role-Based Control Mastery!
The Intersection of Data Privacy and Application Security Posture Management
Guarding from Within: Tackling Insider Threats with App Security
Scale Up App Security Posture for Enterprise Titans!
Securing APIs Best Practices and Common Pitfalls
Is your API security policy automated and orchestrated? Automating API security
Blockchain API Security
Turbo charge your CI/CD with Code Scanning
Code Scanning vs. Pen Testing-- Who Wins?
Cracking the Code: Safeguarding Smart Contracts with Crypto Scanning
Detecting Vulnerabilities Early
The Future: Emerging Trends and Technologies
Beyond the Noise: Silencing False Alarms in Code Scanning
Code Scanning Tool Comparison
Micro Marvels: Unveiling Vulnerabilities Across Microservices
The Role of Code Scanning in Zero Trust Architecture (ZTA)
Unite and Conquer: Empowering Developers in the Code Security Saga
Cipher Sleuths: Locking Down Encryption with Code Scanning Vigilance!
Real Time Enforcement of Security Standards
Playtime's Over! Dynamic Sandboxing: Real-Time Threats, Meet Your Match!
Attack Alert! Runtime Intrusion Detection Systems: Keeping Bad Actors Away
Thwarting Attacks with Runtime Security
Runtime Security Resurgence: Navigating Future Trends in App Protection
Guardian of Secrets: Runtime Encryption Safeguards Your Data
Filtering Frenzy: Dynamic Application Firewall (DAF) Safeguards Your Cyberspace!
Identifying Suspicious Behavior as it Happens
Patch with Purpose: Integrity
Data Defenders: Keeping Your Information Safe Every Step of the Way with Runtime Encryption!
Identifying Anomalies and Threats
Unlocking the Clues: Runtime Forensics, Sleuthing Through Security Incidents
Product Security Compliance & Legal Considerations
Building a Product Security Practice in a DevOps World
Challenges: What are the Current Challenges to Product Security?
Standing Up a Successful Product Security Program
The Three Pillars of Product Security
Product Security vs. Application Security - Key Differences
Securing the Product Security Supply Chain
Future Trends and Emerging Technologies in Product Security
Intro to Product Security: The Whys and Hows
The importance of Product Security in Today’s Digital Landscape
Key Principles of Product Security