
Join key industry professionals and leaders in this three-day Cyber Threats and Breach Protection Summit as they discuss the newest cyberthreats, vulnerabilities and breach detection and prevention insights that will ensure critical data and assets are protected.
Register for free thought leadership from the world’s top speakers, vendors and evangelists in the form of live webinars, panel discussions, keynote presentations, and webcam videos.
Featured ESG Keynote:
Threat Prevention Anchored by Strong Security Hygiene and Posture Management
With any cyber-threat prevention strategy, organizations must know the assets connected to their networks, whether these assets are vulnerable to exploitation, and which vulnerable assets should be prioritized for remediation actions. These activities are known collectively as security hygiene and posture management. Unfortunately, organizations often manage these fundamental security best practices haphazardly,…
Upcoming Tracks
Explore evolving threat trends and as well as the top counter methods organizations are using to protect themselves from attacks.
Learn how IT security teams can keep on top of emerging and legacy threats to organizations along with proactive data breach prevention strategies.
Discover the tools and best practices designed to help your security team detect incidents, identify breaches, and launch appropriate responses.
A special thank you to our Sponsors!
Diamond

Platinum






Gold



In Partnership


Featured Presenters

Heng Mok
CISO APJ
Zscaler

Brian Reed
Director, Cyber Security Strategy
Proofpoint

Nicolas Hernandez
Systems Engineer
Clumio

Lee Dolsen
Chief Architect Asia Pacific and Japan
Zscaler

Philip Vejre
Cryptographer (PhD) and Tech Lead
CYBERCRYPT

Michael Pepin, CISSP
Sr. Security Architect
Clumio

Carl Leonard
Cybersecurity Strategist, EMEA
Proofpoint
Audience
CISOs, CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Advisors, Partners and Consultants within:
IT / IT Security / IT Operations
Network Security / Systems Engineering
Internal Audit / Compliance / IT Risk
Incident Response
Security / Information Security / Information Assurance
Data Privacy / Data Security
Cloud Security / Solutions Architecture
Breach Protection
Cybersecurity / Cyber Intelligence
Product Management
Service Delivery
Threat Detection