Powered by

6 - 8 Dec • America • Online

Building a Positive Security Culture Across the Business

Days

Hours

Mins

Secs

Security Digital Summit

With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.

Join 70+ senior Security leaders on business-critical challenges and disruptive technology and drive your industry forward collaboratively.

70

Attendees

100%

Senior Executives

9 Hrs

Industry Insights
image/svg+xml Watch video

Why Attend

Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:

Build new connections with likeminded senior leaders

Stay current with emerging business trends

Understand the impact new technology can make

De-risk new projects by gaining a broad range of insights

Accelerate key projects through meaningful new partnerships

Downloadable and actionable takeaways

Event Agenda

Day one
Day two
Day three

09:00 - 09:20

09:00 - 09:20

Opening Remarks

Intro & Challenger Panel

3 Roundtable moderators

Dr. James Quick Director Soluctions and Avidsory, Simeio
Stephen Gates ‎Security Evangelist and Senior Solutions Specialist, Checkmarx
Hadar Freehling Cloud Security Solutions Architect, VMware

09:20 - 09:50

09:20 - 09:50

Keynote

09:55 - 10:35

09:55 - 10:35

Workshop

Five steps to unlock the SOC

Unlocking business growth means opening up newer business models, enabling omni-channel experiences, connecting more “things”, and better engaging employees, partners and customers. In the Information Age, that can mean more risk

Mike Nichols Security Head of Product, Elastic

10:35 - 10:45

10:35 - 10:45

Insight Break

10:45 - 11:45

10:45 - 11:45

Roundtables

Track 1: Zero to Hero - When, Where and How to Place Trust

With increased digital transformation programs, Zero Trust approach in achieving security goals is becoming a requirement from the start of the journey. What metrics, measures, methods, and messages resonate in today’s trust environment?

Dr. James Quick Director Soluctions and Avidsory, Simeio

Track 2: What You Need to Know about Modern Application Development (MAD)

Today’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models, and release frequencies can no longer keep pace with demand

Stephen Gates ‎Security Evangelist and Senior Solutions Specialist, Checkmarx

Track 3: Underground or in the Cloud: The Reality of Risk Being Omnipresent

Internal digital transformations, changing buyer mentality or anything in-between - the CISO is responsible for the protection of the company, including the most valuable asset of the 21st century: data

Hadar Freehling Cloud Security Solutions Architect, VMware

11:50 - 12:20

11:50 - 12:20

Closing Keynote

Keeping Pace with Process: Best Practices for Managing Security at Scale

In this deep dive session, Synack Solutions Architect and Red Team Expert, Jeremiah Roe takes a practical approach to the attacker lifecycle

Jeremiah Roe Solutions Architect, Synack

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Workshop

Security Operations and The Convergence of Pretty Much Everything

As each organization implements a layered security program, across a distributed infrastructure and shared responsibility with their service providers, how can they efficiently gain visibility into malicious activity and orchestrate effective, business wide responses to attacks?

Chris Bontempo Chief Marketing Officer, Americas, IBM
Charles Henderson Global Managing Partner and Head of X-Force, IBM

09:45 - 10:25

09:45 - 10:25

Panel Discussion

10:25 - 10:35

10:25 - 10:35

Insight Break

Erik Thoen VP, Product Management, ReversingLabs

10:35 - 11:35

10:35 - 11:35

Roundtables

Track 1: Zero to Hero - When, Where and How to Place Trust

With increased digital transformation programs, Zero Trust approach in achieving security goals is becoming a requirement from the start of the journey. What metrics, measures, methods, and messages resonate in today’s trust environment?

Dr. James Quick Director Soluctions and Avidsory, Simeio

Track 2: What You Need to Know about Modern Application Development (MAD)

Today’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models, and release frequencies can no longer keep pace with demand

Stephen Gates ‎Security Evangelist and Senior Solutions Specialist, Checkmarx

Track 3: Underground or in the Cloud: The Reality of Risk Being Omnipresent

Internal digital transformations, changing buyer mentality or anything in-between - the CISO is responsible for the protection of the company, including the most valuable asset of the 21st century: data

Hadar Freehling Cloud Security Solutions Architect, VMware

11:40 - 12:10

11:40 - 12:10

Closing Keynote

Building a positive security culture across the business

With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges

Rinki Sethi VP and CISO, Twitter

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Keynote

How security leaders are using cyber ranges to accelerate learning & development and improve overall security posture

Would you board a plane if you knew the pilot got all A’s in flight school? Probably yes, but what if you learned that the pilot got all A’s, but this was their first time actually flying a plane, and that they never went through any flight simulation training? You’d likely turn around and walk back to the terminal. Just as surgeons must complete a residency, and pilots must undergo flight simulation, cyber defenders should be held to the same standard. Debbie Gordon, Founder & CEO of Cloud Range, will discuss how simulation has quickly become the new standard in cybersecurity for: -Continuous upskilling -Hiring -Measuring risk and preparedness -Establishing learning path for cyber talent Security leaders now understand that advanced technologies aren’t enough to ensure an organization is truly prepared to face any threat, but that the last line of defense (the PEOPLE) must be prepared to detect and remediate a threat before it becomes an incident. This can be done using cyber ranges and other advanced simulation technologies, paired with a system that measures the learning and progress of cyber defenders

Debbie Gordon Founder and CEO, Cloud Range

09:45 - 10:25

09:45 - 10:25

Workshop

Digital Transformation & Response Plan

Don Foster Vice President, Global Sales Engineering, Commvault

10:25 - 10:35

10:25 - 10:35

Insight Break

Erik Thoen VP, Product Management, ReversingLabs

10:35 - 11:35

10:35 - 11:35

Roundtable Review

Dr. James Quick Director Soluctions and Avidsory, Simeio
Stephen Gates ‎Security Evangelist and Senior Solutions Specialist, Checkmarx
Hadar Freehling Cloud Security Solutions Architect, VMware

11:40 - 12:10

11:40 - 12:10

Keynote

The Future of Cyber

The future of Cyber - where will we be headed in 2022?

Adam Golodner Managing Partner, AMG Global Cyber Law

Event Highlights

Immerse yourself in the most advanced virtual event platform, blending the convenience and reach of digital with the interaction of physical events. Experience the new way to network with peers with interactive features including:

Audience Interaction

Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.

Live Polling

The ultimate live polling and gamification tools, keeping your audience engaged.

Audience Q&A

Enabling our team to help you control your session experience.

Interactive Quizzes

Interactive quizzes to gamify your session

Thought Leadership

Content and insight from industry experts when it matters most

FAQs

Still have a question contact us below

Previous attendees include