Dionisio Zumerle

Dionisio Zumerle

VP Analyst
Dionisio Zumerle's research revolves around mobile and application security. Mr. Zumerle's coverage includes secure mobility strategies, application security and testing, mobile threat defense, endpoint security and security and compliance of instant communications. His research interests also include emerging technology areas, such as security of the Internet of Things, secure robotic process automation, and trusted environments.
Read More Read Less
Monday, 18 May, 2020 08:00 AM|Monday, 18 May, 2020 08:45 AM
CISO Circle: Welcome and Orientation Session

This orientation session is designed to help attendees make Security and Risk Summit the most productive experience. It will provide you with tips on how to navigate your way through the CISO Circle Program and overall conference and give you a chance to meet your fellow CISOs. Topics will include a review of the agenda, interactive sessions, networking and much more with plenty of time for Q&A.

Tuesday, 19 May, 2020 09:45 AM|Tuesday, 19 May, 2020 10:45 AM
Roundtable: Best Practices in Countering Ransomware

Analysis shows that over 90% of ransomware attacks are preventable, and yet, ransomware attacks are increasing, posing a notable threat to business data and productivity. Global economic losses from “WannaCry” alone are estimated to be between 1.5 to 4 billion Euros.
In this roundtable, attendees will discuss best practices with their peers, share successes and perhaps some failures in combating ransomware, and what to do about them.

Tuesday, 19 May, 2020 01:45 PM|Tuesday, 19 May, 2020 02:30 PM
Outlook for Endpoint and Mobile Security 2020

Endpoints security challenges are rising to new levels of complexity as the definition blurs across clouds, BYO, workstations, mobile, wearable, “things” and pure software.

This session will address
1. The evolution of device security to a single Unified Endpoint Security (UES) solution
2. The evolution of network security from on-premise to cloud based since devices are frequently accessing cloud based services.
3. The evolution of modern data protection for devices including VDI, encryption, and DRM

Meet the experts face to face.