Security Operations
Category

Security Operations

Planning, implementing and administrating any security program takes a great deal of planning, careful execution and flexibility. With new threats coming from new directions all the time, how can an organization plan for the future and keep up with the ever-changing threat landscape? Hear suggestions from our experts on what to consider and how to juggle the competing priorities.

Security Operations

Royal Bank of Scotland Disrupts Fraudsters: A Voice Biometrics Case Study

Brett Beranek - Nuance Communications, Inc. , Jason Costain - Royal Bank of Scotland  •   • 

Start this Session

Cryptocurrency Fraud and Blockchain Forensic Analysis

Ondrej Krehel - LIFARS LLC  •   • 

Start this Session

Fraud Fusion Center - A Walk Along the Journey of Challenges, Successes, and Interesting Findings

Jeffrey Dant - Citi  •   • 

Start this Session

Breach Response: The Board's Role & PR Mistakes to Avoid

Mark Rasch - Rasch Technology and Cyber Law  •   • 

Start this Session

Built-in Security Innovation From the Ground Up

Avinash Lotke - Microsoft  •   • 

Start this Session

Reducing Data Breach Risk With Advanced IAM: A Practitioner's Perspective

Charanjit Singh Sodhi - Nomura Wholesale  •   • 

Start this Session

Securing the Data With Increased Networking Visibility Techniques

Ian Farquhar, Distinguished Sales Engineer, Gigamon - Gigamon  •   • 

Start this Session

Preparing for India's Breach Notification Law: Applying Controls

Vaishali Bhagwat - Cyber Law Professional , Uday Deshpande - L&T Group of Companies , Sachin Kawalkar - J P Morgan  •   • 

Start this Session

Upgrading Your Security Operations Center: A Strategic Approach

Ganesh Prasad - RSA  •   • 

Start this Session

Incident Response Plans: Global Compliance Mandates and Obligations

Ronald Raether - Troutman Sanders  •   • 

Start this Session

Government Agencies: Avoid Unwanted Privileged Access to Your Critical Systems and Data

Paul Turner - Venafi  •   • 

Start this Session

Seeing Beyond the Hype: The Power of AI and ML to Detect Advanced Threats

Mustafa Rassiwala - Lastline  •   • 

Start this Session

Preparing for Canada's Breach Notification Law

Imran Ahmad - Miller Thomson LLP , Ruth Promislow - Bennett Jones LLP, Toronto  •   • 

Start this Session

SIEM & Security Analytics: What's On the Horizon?

David Bosomworth - IBM , Chris Meenan - IBM  •   • 

Start this Session

Session Contributors

Alon Arvatz

Co-Founder, IntSights

Read Bio
Ashish Sud

Head, Western Region, Sophos

Read Bio
Avinash Lotke

Director - Technology Solutions, CyberSecurity Solution Group, Microsoft

Read Bio
Balsing Rajput

Superintendent of Police, Cyber Division, Maharashtra Police

Read Bio
Ben Chung

CISO, NTT Communications

Read Bio
Brett Beranek

Vice President & General Manager, Security Line of Business, Nuance Communications, Inc.

Read Bio
Brian Varine

Chief, Justice Security Operations Center (JSOC), US Dept. of Justice - Criminal Division

Read Bio
Casey Smith

Director of Applied Research, Red Canary

Read Bio
CF Chui

Security Technologist, Arbor Networks

Read Bio
Charanjit Singh Sodhi

Executive Director - Head of Identity and Access Management, Nomura Wholesale

Read Bio
Chris Collard

Offering Manager, IBM QRadar, Cloud

Read Bio
Chris Meenan

Director, QRadar Security Intelligence Product Management and Strategy, IBM Security

Read Bio
David Bosomworth

Director, WorldWide, IBM Security Intelligence

Read Bio
David Goldschlag

SVP of Strategy & CEO, Pulse Secure

Read Bio
Frank McClain

Senior Threat Analyst, Red Canary

Read Bio
Ganesh Prasad

Pre-Sales Manager, India & SAARC, RSA

Read Bio
Imran Ahmad

Partner - Toronto Office, Miller Thomson LLP

Read Bio
Jason Costain

Head of Fraud Strategy and Relationship Management, Royal Bank of Scotland

Read Bio
Jeffrey Dant

Global Lead, Fraud Fusion Center, Citi

Read Bio
Joseph Carson

Chief Security Scientist, Thycotic

Read Bio
Keith McCammon

Chief Security Officer and Co-Founder, Red Canary

Read Bio
Mark Rasch

Principal, Rasch Technology and Cyber Law; former Chief Security Evangelist, Verizon

Read Bio
Matt Konwiser

Technical Sales Manager - Financial Markets North America, IBM

Read Bio
Mischel Kwon

President/CEO, MKA Cyber

Read Bio
Mohit Puri

Director Presales - India/SAARC, Sophos Technologies

Read Bio
Mustafa Rassiwala

Sr. Director of Products, Lastline

Read Bio
Naveen Gurusiddaiah

Head - Technical Services, Micro Focus, India

Read Bio
Ondrej Krehel

Cybersecurity & Digital Forensics, LIFARS LLC

Read Bio
Pamela Dingle

Senior Technical Architect, Ping Identity

Read Bio
Paul Turner

CTO for Products, Venafi

Read Bio
Pavan Duggal

Advocate, Supreme Court of India

Read Bio
Prasanna Prabhakara

Product Manager, Wipro Limited

Read Bio
Prof. Yehuda Lindell

Chief Scientist, Unbound Tech

Read Bio
Roger Grimes

Data-Driven Defense Evangelist

Read Bio
Ronald Raether

Partner, Troutman Sanders

Read Bio
Ruth Promislow

Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

Read Bio
Sachin Kawalkar

Vice President, J P Morgan

Read Bio
Sam Elliott

Director of Security Product Management, Bomgar

Read Bio
Saurabh Airi

Technical Sales Consultant & Pre-Sales Solution Architect - South Asia, Entrust Datacard

Read Bio
Uday Deshpande

Group CISO, L&T Group of Companies

Read Bio
Vaishali Bhagwat

Advocate-Cyber Law Professional

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.