Speaker bio

Dionisio Zumerle

Dionisio Zumerle

VP Analyst
Dionisio Zumerle's research revolves around mobile, endpoint and application security. Mr. Zumerle's coverage includes securing mobile applications, application security testing, DevSecOps, mobile threat defense and protecting endpoints from malware. His research interests also include emerging technology areas, such as secure robotic process automation and web app client-side protection.
Read More Read Less
Monday, 18 May, 2020 / 08:00 AM - 08:45 AM CEST
CISO Circle: Welcome and Orientation Session

This orientation session is designed to help attendees make Security and Risk Summit the most productive experience. It will provide you with tips on how to navigate your way through the CISO Circle Program and overall conference and give you a chance to meet your fellow CISOs. Topics will include a review of the agenda, interactive sessions, networking and much more with plenty of time for Q&A.

Tuesday, 19 May, 2020 / 09:45 AM - 10:45 AM CEST
Roundtable: Best Practices in Countering Ransomware

Analysis shows that over 90% of ransomware attacks are preventable, and yet, ransomware attacks are increasing, posing a notable threat to business data and productivity. Global economic losses from “WannaCry” alone are estimated to be between 1.5 to 4 billion Euros.
In this roundtable, attendees will discuss best practices with their peers, share successes and perhaps some failures in combating ransomware, and what to do about them.

Tuesday, 19 May, 2020 / 01:45 PM - 02:30 PM CEST
Outlook for Endpoint and Mobile Security 2020

Endpoints security challenges are rising to new levels of complexity as the definition blurs across clouds, BYO, workstations, mobile, wearable, “things” and pure software.

This session will address
1. The evolution of device security to a single Unified Endpoint Security (UES) solution
2. The evolution of network security from on-premise to cloud based since devices are frequently accessing cloud based services.
3. The evolution of modern data protection for devices including VDI, encryption, and DRM

Meet the experts face to face.