Identity security is harder than ever for security teams as criminal actors increasingly leverage AI and other advanced tools to compromise identity systems. The problem and solutions were covered ...
Renowned IAM Transformation Expert | Strategist | Compliance Authority. With a unique blend of strategy, compliance, and identity expertise, Carmen has a proven track record of driving successful ...
Kalyani Pawar is a seasoned Application Security expert with a deep passion for the startup ecosystem. With extensive experience in designing security programs from the ground up for startups of ...
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk ...
Currently, Daniel is the Co-Founder and CTO of Drata Inc. Drata is the worldâ s most advanced compliance automation platform with the mission to help companies earn and keep the trust of their ...
Erez Hasson is an Application Security Specialist at Imperva. He oversees the go-to-market product strategy of Imperva Advanced Bot Protection, Imperva Account Takeover Protection, and Imperva ...
Thomas Johnson – TJ – Currently leads the cybersecurity teams in the US market for a large consulting firm, he also acts as a security advisor to highly regulated organizations and firms that ...
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Attend this webinar to learn about the key findings of the research ...
Michael has been in the security/cyber security and incident response/forensic investigation and security software space for more than 20 years. He has been certified in endpoint security ...
With more than 25 years in information security, Brandon has played nearly every position on the field. From security engineer to CISO, from security entrepreneur to Product Manager, he has either ...