Network, System, App, Data Security Practitioners 


As organizations prepare to securely cross the digital business chasm, security professionals require practical methods and longer-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. The security and risk summit provides you with methodologies to support these new use cases as well as improve the efficiency of more mature technologies and processes.


This conference will help Network, System, App, Data Security Practitioners - IT Operations Directors, Managers, Analysts, Advisors:


  • Understand best practices to rearchitect your networks to enable a smooth transition to the adoption of cloud-based security services
  • Get a prescriptive guidance on what your organization needs to protect your cloud infrastructure and applications and get tips on how to evaluate and build a shortlist for your vendor selections
  • Develop security strategies that treat data as a pervasive asset (and liability)
  • Understand how a data security governance framework provides business focus and get practical steps to develop a data security governance framework
  • Learn best practices in securing APIs
  • Get best practices on how to monitor, track and manage enterprise data and the best product and service options available today for DLP
  • Get insights on the outlook for application vulnerabilities and application security programs, as well as the newest developments in application security practices and technologies.
  • Learn how applications can be protected on the inside without requiring external components to be installed on the device
  • Understand common attack patterns the technologies useful in mitigating each type of attack and what adjustments must be made for cloud-native application development
  • Learn about the market and main vendors in the application security testing space
  • The Role of Network Traffic Analysis in Today’s Threat Environment
  • Innovation in Network Security Moving From Preventing to Detecting
  • The Endpoint is the New Perimeter: How to Build an Effective Endpoint Protection Strategy
  • Endpoint Security 101: EPP/EDR Convergence Best Practices
  • Magic Quadrant for Endpoint Protection Platforms


Back to top

Relevant sessions covered at the conference:
  • The State of Network Security in the Cloud Era
  • Cloud Security Foundational and Advanced Controls
  • Outlook for Data Security 2019
  • Creating a Data Security Governance Strategy
  • The CISO Guide to API Security: Enabling Innovation Without Enabling Attacks and Data Breaches
  • How to Implement a Holistic DLP Strategy
  • Outlook for Application Security 2019
  • Define Your Mobile Application Security Strategy
  • Navigating the Technology Landscape of Web Application Protection
  • Magic Quadrant for Application Security Testing
  • Hear about the latest trends in network-based advanced threat detection, including new techniques for anomaly detection and will learn about the key vendors in the market
  • Learn how to evolve your products for success through detection
  • Hear about the changing endpoint defensive strategies from detection and response to proactive hardening
  • Learn about the convergence between EDR and EPP and best practices in endpoint security
  • Get an evaluation of vendors in the Endpoint protection space


Back to top

Sign up for information on the agenda, announcements and more! 

Thank You, Please add the domain to your safe sender list to ensure receipt of future email.
Thanks for the subscription.
Error occurred in submitting the form. Please try again!
Error occurred in submitting the form. Please try again!
Thank You, Please check your inbox to confirm your subscription and add the domain to your safe sender list to ensure receipt of future email.

Join fellow Network, System, App, Data Security Practitioners at this year's conference.