The Top 20 Security Predictions for 2020

Logo
Presented by

Dan Lohrmann (Security Mentor, Inc.) | Marija Atanasova (BrightTALK)

About this talk

Every year the top security companies, industry thought-leaders and tech media publications come out with their predictions for the coming year. And every year Dan Lohrmann publishes his roundup of these security industry reports, forecasts and trends. This BrightTalk webinar will dig into the 2020 report in detail. Link to the report: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-20-security-predictions-for-2020.html There is huge career value for technology and security professionals who understand where the cybersecurity industry predictions, and you can read about those benefits in this CSO Magazine article: https://www.csoonline.com/article/3021951/why-more-security-predictions-and-how-can-you-benefit.html In addition to counting down (and referencing) the top 20 security prediction reports from the leading vendors, this webinar will examine: - Where is their agreement on what’s coming next? - Where is their major disagreement? - Where will cyberattacks come from next? - Which vendors have the best reports (and why)? - Who are the award-winners for most creative, most likely, most scary and other security industry predictions? We will discuss security and tech predictions on AI, autonomous vehicles, cloud solutions, cyberthreats, ransomware, IoT, malware, multi-factor authentication, business priorities, data breaches, spending, new vulnerabilities to watch for, mobile threats, 5G, new announcements, major security incidents, government contracts, election security, attacks on global events (like the 2020 Olympics), cyber incident response and much, much more. At the end, we will take your questions on all of this, and may even ask you to vote for your favorite predictions (or offer one of your own to share.) Join us.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (787)
Subscribers (198320)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.