Join the discussion with experts, visionaries and leaders at this four-day online event. Don’t miss your opportunity to have your questions answered in these live presentations!
To gain access for free, select any of the tracks below and individually register for each talk.
Tracks
Understand the latest cyber threats your organization is facing and learn strategies to address them.
Discover solutions for vulnerability scanning and threat detection across applications and devices on your network.
Learn the fundamentals of shift-left security, and see how security with DevOps can deliver more secure software and services in a fast-moving environment.
Get the latest threat research and recommendations from security experts on how to prevent and detect data breaches.
Summit Sponsors
Diamond




Platinum







Gold






Featured Presenters

Abby Guha
Senior Director Product Marketing
Yubico

Ameet Naik
Cybersecurity Evangelist
PerimeterX

Pete Starr
Director of Sales Engineering
Cyren

Jo Peterson
Vice President, Cloud & Security Services
Clarify360

Andres Guisado
Principal Solutions Engineer
CyberArk

Aaron Fletcher
Senior Security Consultant
CyberArk

Stella Igwenazor
IT Security Consultant
Syberficial

Jay Spann
SOAR Evangelist
Swimlane

Lee Rothman
Vice President of Global Systems Engineering
Swimlane

Myrna Soto
Chief Strategy and Trust Officer
Forcepoint

Tom Bienkowski
Director Product Marketing
NETSCOUT

Richard Hummel
Threat Intelligence Manager
NETSCOUT
More Summits
End-to-End Cloud Security: APAC Edition 2020
As organizations become increasingly reliant on cloud computing, it is essential to have cloud security strategies, solutions and tools in place, in order to protect cloud based systems, data and infrastructure. From lack of visibility and transparency, data breaches and multi-cloud strategies and approaches, cloud security continues to grow in complexity.
Identity Management and Cloud Security
As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. From new applications being consistently added to your network to employees taking access control shortcuts and credentials being compromised, it is clear that there are endless vulnerabilities to detect…