Featured Presenters

Troels Oerting headshot

Troels Oerting

CISO

Barclays

Leo Taddeo headshot

Leo Taddeo

Chief Security Officer

Cryptzone

Ian Glover

President

CREST

Mary Jane Kelly headshot

Mary Jane Kelly

Security Consultant

NCC Group

Steve Durbin headshot

Steve Durbin

Managing Director

ISF Ltd.

Stephan Jou headshot

Stephan Jou

CTO

Interset

Dr Markus Jakobsson headshot

Dr. Markus Jakobsson

Chief Scientist

Agari

Kent Woodruff headshot

Kent Woodruff

Chief Security Officer

Cradlepoint

Recent Webinars

February 21, 2018 5:17am EST

Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people…

January 19, 2017 1:00pm EST

Open-minded, collaborative, and engaged, Millennials embrace values that can be effectively directed to reduce risk across an organization. While some…

December 14, 2016 12:00pm EST

2016 was record-setting … and threats aren’t likely to subside in 2017. Let’s reflect on what happened this year and…

December 13, 2016 2:00pm EST

To close out 2016, we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll…

December 13, 2016 1:00pm EST

The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn – one of the largest managed DNS…

December 13, 2016 1:00pm EST

If your organization deals with credit card information, you must take steps to protect the information. Organizations that suffer a…

December 12, 2016 1:00pm EST

Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the…

December 12, 2016 12:00pm EST

The landscape that today’s CISOs operate in and the role they fill has fundamentally changed in the last few years….

December 9, 2016 3:00pm EST

Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger…

December 8, 2016 1:00pm EST

Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in…

December 8, 2016 1:00pm EST

Discover the smarter way to protect endpoints. Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence…

December 8, 2016 1:00pm EST

In the past year there were numerous high-profile breaches including; insurance companies, government organizations, kid’s internet gaming, power utilities and…

December 8, 2016 12:00pm EST

This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated…

December 8, 2016 12:00pm EST

Cyber attacks are on the rise, both in volume and impact, and organizations worldwide are focusing on improving cybersecurity and…

December 8, 2016 1:00am EST

We all know that technology plays a role in our everyday life but do you know the extent of that…

December 7, 2016 2:00pm EST

Email is the most popular communication tool, as well as the entry point for up to 95% of security breaches….

December 7, 2016 1:00pm EST

2016 has been a milestone year for SaaS security threats, with a 3x increase in phishing attacks, 6x increase in…

December 7, 2016 1:00pm EST

Cybersecurity threats are evolving more quickly than most organizations can pivot to defend against them. The 2016 IDC report states…

December 7, 2016 12:00pm EST

Once again it’s been a bad year for computer security. But while we are focused on the increased threats of…

December 7, 2016 12:00pm EST

Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense…

December 7, 2016 12:00pm EST

Year after year some of the trends for vulnerabilities remain unchanged while others arise or shift. In this webinar, Kasper…

December 7, 2016 12:00pm EST

With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe…

December 7, 2016 11:00am EST

The rise of attacks resulting in huge business losses have brought cyber security into the board room. Prior to the…

December 7, 2016 10:00am EST

As the sophistication of encryption and technical defences rises each year, so do the attacks against the people in organizations….

December 7, 2016 9:00am EST

Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan…

December 7, 2016 9:00am EST

Join this engaging session as BrightTALK conducts an in-depth interview with Troels Oerting, CISO, Barclays. It’s been a crucial year…

December 7, 2016 9:00am EST

As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and…

December 7, 2016 8:00am EST

Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing…

December 7, 2016 6:00am EST

We’re starting to see the refining of techniques that have been built over a number of years. The past 5…

December 7, 2016 5:00am EST

We all know that technology plays a role in our everyday life but do you know the extent of that…


December 6, 2016 4:00pm EST

With continued improvements in payments security through technologies such as P2PE and EMV, the PCI community has been effective at…

December 6, 2016 2:00pm EST

2016. What a year. Information Security professionals will certainly echo that sentiment. This year alone we’ve seen a four-fold increase…

December 6, 2016 1:00pm EST

Cyber extortion can take many forms. From ransomware and sextortion, to DDoS shakedowns, and data-dump blackmail, organizations all over the…

December 6, 2016 12:00pm EST

With the rapid growth of mobile devices, cloud-based applications, credit card purchases, and the Internet of Things in the distributed…

December 6, 2016 11:00am EST

Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST. It’s been a crucial…

December 6, 2016 9:00am EST

The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers…

December 6, 2016 8:00am EST

Despite the rise of the cloud and increased reliance on web applications, native desktop applications are still highly relevant and…

December 6, 2016 7:00am EST

Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our…

Summit Sponsors

Related Summits

See all

December 11, 2018

Analytics has become more and more prevalent in every aspect of business and with that comes adoption of and innovation…

December 10, 2018

Disruptive cyber attacks are on the rise and all industries are at risk. Enterprises and small businesses are scrambling to…

December 4, 2018

IT infrastructure is mission-critical to the success of the enterprise. Yet CIOs are struggling to improve the productivity of both…