Security Operations
Category

Security Operations

Planning, implementing and administrating any security program takes a great deal of planning, careful execution and flexibility. With new threats coming from new directions all the time, how can an organization plan for the future and keep up with the ever-changing threat landscape? Hear suggestions from our experts on what to consider and how to juggle the competing priorities.

Security Operations

Breach Response: The Board's Role & PR Mistakes to Avoid

Mark Rasch - Rasch Technology and Cyber Law  •   • 

Start this Session

Built-in Security Innovation From the Ground Up

Avinash Lotke - Microsoft  •   • 

Start this Session

Reducing Data Breach Risk With Advanced IAM: A Practitioner's Perspective

Charanjit Singh Sodhi - Nomura Wholesale  •   • 

Start this Session

Securing the Data With Increased Networking Visibility Techniques

Ian Farquhar, Distinguished Sales Engineer, Gigamon - Gigamon  •   • 

Start this Session

Preparing for India's Breach Notification Law: Applying Controls

Vaishali Bhagwat - Cyber Law Professional , Uday Deshpande - L&T Group of Companies , Sachin Kawalkar - J P Morgan  •   • 

Start this Session

Upgrading Your Security Operations Center: A Strategic Approach

Ganesh Prasad - RSA  •   • 

Start this Session

Incident Response Plans: Global Compliance Mandates and Obligations

Ronald Raether - Troutman Sanders  •   • 

Start this Session

Government Agencies: Avoid Unwanted Privileged Access to Your Critical Systems and Data

Paul Turner - Venafi  •   • 

Start this Session

Seeing Beyond the Hype: The Power of AI and ML to Detect Advanced Threats

Mustafa Rassiwala - Lastline  •   • 

Start this Session

Preparing for Canada's Breach Notification Law

Imran Ahmad - Miller Thomson LLP , Ruth Promislow - Bennett Jones LLP, Toronto  •   • 

Start this Session

SIEM & Security Analytics: What's On the Horizon?

David Bosomworth - IBM , Chris Meenan - IBM  •   • 

Start this Session

Digital Trust - Going Beyond Identity, Fraud, and the SOC

Matt Konwiser - IBM  •   • 

Start this Session

The Dirty Secrets of Network Firewalls

Mohit Puri - Sophos Technologies  •   • 

Start this Session

Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses

Sam Elliott - Bomgar  •   • 

Start this Session

Session Contributors

Alon Arvatz

Co-Founder, IntSights

Read Bio
Ashish Sud

Head, Western Region, Sophos

Read Bio
Avinash Lotke

Director - Technology Solutions, CyberSecurity Solution Group, Microsoft

Read Bio
Balsing Rajput

Superintendent of Police, Cyber Division, Maharashtra Police

Read Bio
Ben Chung

CISO, NTT Communications

Read Bio
Brian Varine

Chief, Justice Security Operations Center (JSOC), US Dept. of Justice - Criminal Division

Read Bio
Casey Smith

Director of Applied Research, Red Canary

Read Bio
CF Chui

Security Technologist, Arbor Networks

Read Bio
Charanjit Singh Sodhi

Executive Director - Head of Identity and Access Management, Nomura Wholesale

Read Bio
Chris Collard

Offering Manager, IBM QRadar, Cloud

Read Bio
Chris Meenan

Director, QRadar Security Intelligence Product Management and Strategy, IBM Security

Read Bio
David Bosomworth

Director, WorldWide, IBM Security Intelligence

Read Bio
David Goldschlag

SVP of Strategy & CEO, Pulse Secure

Read Bio
Frank McClain

Senior Threat Analyst, Red Canary

Read Bio
Ganesh Prasad

Pre-Sales Manager, India & SAARC, RSA

Read Bio
Imran Ahmad

Partner - Toronto Office, Miller Thomson LLP

Read Bio
Joseph Carson

Chief Security Scientist, Thycotic

Read Bio
Keith McCammon

Chief Security Officer and Co-Founder, Red Canary

Read Bio
Mark Rasch

Principal, Rasch Technology and Cyber Law; former Chief Security Evangelist, Verizon

Read Bio
Matt Konwiser

Technical Sales Manager - Financial Markets North America, IBM

Read Bio
Mischel Kwon

President/CEO, MKA Cyber

Read Bio
Mohit Puri

Director Presales - India/SAARC, Sophos Technologies

Read Bio
Mustafa Rassiwala

Sr. Director of Products, Lastline

Read Bio
Naveen Gurusiddaiah

Head - Technical Services, Micro Focus, India

Read Bio
Pamela Dingle

Senior Technical Architect, Ping Identity

Read Bio
Paul Turner

CTO for Products, Venafi

Read Bio
Pavan Duggal

Advocate, Supreme Court of India

Read Bio
Prasanna Prabhakara

Product Manager, Wipro Limited

Read Bio
Prof. Yehuda Lindell

Chief Scientist, Unbound Tech

Read Bio
Roger Grimes

Data-Driven Defense Evangelist

Read Bio
Ronald Raether

Partner, Troutman Sanders

Read Bio
Ruth Promislow

Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

Read Bio
Sachin Kawalkar

Vice President, J P Morgan

Read Bio
Sam Elliott

Director of Security Product Management, Bomgar

Read Bio
Saurabh Airi

Technical Sales Consultant & Pre-Sales Solution Architect - South Asia, Entrust Datacard

Read Bio
Uday Deshpande

Group CISO, L&T Group of Companies

Read Bio
Vaishali Bhagwat

Advocate-Cyber Law Professional

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.