Look inside most business organizations and you’ll find that their endpoint environments have become increasingly complex, divergent and fragmented – with a proliferation of workstations ...
Michael has been in the security/cyber security and incident response/forensic investigation and security software space for more than 20 years. He has been certified in endpoint security ...
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Attend this webinar to learn about the key findings of the research ...
Tony is a cyber security evangelist at Delinea helping deliver cloud identity security solutions to secure modern enterprises and stop the leading cause of breaches — privileged access abuse ...
Jessica has been with EC-Council for 5+ years and has grown the conference division through her partnerships with ISSA, OWASP, ISACA, ISC2, etc. Jessica is the main point of contact for ...
Thomas Johnson – TJ – Currently leads the cybersecurity teams in the US market for a large consulting firm, he also acts as a security advisor to highly regulated organizations and firms that ...
Brandon is the Co-founder and Chief Scientist at Capsule8. He is responsible for cybersecurity research strategy and for operationalizing findings into resulting innovations. Prior to Capsule8 ...
Eden Koby Naftali is a CTO Expert at Wiz, the world’s fastest growing cloud security company that serves over 30% of the Fortune 100. Before Wiz, Eden worked in US politics and ran and co ...
Haider Dost leads Global Threat Intelligence and Detection Engineering at Snowflake. He has over nine years experience in cybersecurity with a focus on Security Operations, Threat Detection, and ...
Jeevan Singh is the Director of Product Security at Twilio, where he is embedding security into all aspects of the software development process. Jeevan enjoys building security culture within ...