Defense in Depth: Exploring the Elements of a Layered Security Program


  • Rubrik
  • KnowBe4
  • Cequence
  • Tanium
  • Snyk
  • Equinix

About This Summit

Security threats evolve constantly to exploit holes in, and between, layers of defense. Attackers adapt quickly to new technologies, and they instantly exploit changes in user and organizational behavior as well as newly discovered flaws in existing tech.

That fast attacker development demands constant vigilance from the IT department. Yet organizations' mix of defense technologies routinely falls out of balance without regular attention. Security controls that were once finely calibrated to the threat landscape can become weighted too heavily toward older attack methods, while leaving the door open to new attack vectors.

Attend this Virtual Summit to hear from top security experts about the latest tactics and techniques in use by the most dangerous attackers. Then learn about tools, techniques, and best practices that will help you make sure your portfolio of security solutions is properly layered for the security realities of 2023!

  1. Murthy Mathiprakasam

    Featuring Murthy Mathiprakasam Senior Director of Product Marketing Rubrik

  2. Roger A. Grimes

    Featuring Roger A. Grimes Data-Driven Defense Evangelist KnowBe4

  3. Tony Bailey

    Featuring Tony Bailey Director of Product Marketing Cequence

  4. Geoff Fisher

    Featuring Geoff Fisher Senior Director, Integration Strategy Whack-a-Mole’ How Multiple Sources of “truth” make Defense in Depth impossible

  5. Frank Fischer

    Featuring Frank Fischer Senior Product Marketing Manager "The First Layer of Security - Your own Code and Dependencies" - Re-thinking Static Code Analysis and SCA, winning devs as security deputies

  6. To Be Announced

    Featuring To Be Announced To Be Announced Equinix

What You'll Learn

  1. Discover the latest trends in ransomware, data breaches, insider threats, and state-sponsored attacks
  2. Learn the common ways security can be overlooked in emerging technologies like cloud, mobile, and IoT
  3. Find out how artificial intelligence is being used on offense AND defense
  4. Get answers to your most pressing security questions from top industry experts!