ORIGINAL DATE: April 6th, 2022

Spotlight on Cybersecurity

A virtual gathering of the nation’s top Cybersecurity leaders in SaaS and technology. The virtual event will begin on the Hopin platform at 11am ET, and run til 5pm ET.

This event has passed but you can still watch the replays listed in the agenda below

You may also be interested in…

July 7th @2PM

Webinar: The LinkedIn Marketer’s Guide to Connected TV

Register Now

Agenda

*All times in Eastern US zone

11:00 am
Stopping Attacks, Not Your Business: A Case Study with Hyosung America
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Read More
12:00 pm
The Evolution of DDoS Extortion: The Ramifications of the Latest Geo-Political Event Attackers on your Security Postures
Your risk of a DDoS attack and proof that attackers can carry out their attacks successfully has risen significantly since 2020. Read More
1:00 pm
The Rising Importance (and Pitfalls) of Compliance Automation Software for SaaS Companies
Compliance automation software is creating a sea change in the compliance world. What are the benefits and drawbacks of these software tools? Read More
2:00 pm
Modern Web Apps and APIs Require Modern Security
The number of web applications and APIs exposed to the internet are growing exponentially. Read More
3:00 pm
Why the Cloud Requires a Platform-centric Approach to Get Cloud Security Right
Enterprises across the globe are expanding to the cloud to power their business in new ways at a scale never before thought possible. Read More
4:00 pm
Three Critical Factors in Building a Comprehensive Security Awareness Program
Three key elements form the foundation of a successful awareness education program: knowledge of audiences, pervasive and continuous communication and interactive education on security tactics. Security and risk management leaders should use this research to implement a comprehensive program. Read More

Speakers

Tony Lauro

Director of Security Strategy Akamai

Marc Paust

Executive Director, Information Security and IT Operations Hyosung America

Marcus Fowler

SVP, Strategic Engagements and Threats Darktrace

Joanna Huisman

SVP of Strategic Insights & Research KnowBe4

Scott Schwan

Chief Product Officer A-LIGN

Mohit Bhasin

Senior Product Marketing Manager Palo Alto Networks

Elad Shuster

Product Manager Palo Alto Networks

Ory Segal

Cloud Security Palo Alto Networks

Larry Cashdollar

Principal Security Intelligence Response Engineer Akamai

Keith Mokris

VP, Product Marketing, Orca Security Orca Security

Brian Elmi

VP of Product Drata

Sponsors

Privacy Notice

This privacy notice discloses the privacy practices for (www.ascentconf.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:

Information Collection, Use, and Sharing

We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information

You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

Security

We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for “https” at the beginning of the address of the Web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

If you feel that we are not abiding by this privacy policy, you should contact us immediately via telephone at 202-256-9707 or [email protected].