Summit By ActualTech Media One Day Only Securing Your Borders: Evolving Each Layer of Your Security Program
5 Vendors Back-to-Back!Register Now
Win One of Our Amazing Summit Grand Prizes!
About This Summit
The best security architectures resemble a stack of slices of swiss cheese. The holes of one slice are blocked by the next slice, preventing the shortcomings of any one layer from allowing anything through.
At this Summit, you'll hear from experts at a broad range of security solution providers and get a complete look at many of the elements that your security architecture should include. The Summit represents an opportunity to explore the evolution of security measures across every layer, offering valuable insights for enhancing overall security posture.
Get a valuable refresher on the complexities of establishing a strong defense, from physical security measures to application and network security. At the same time, discover new elements and features of security tools that can make your organization even more resilient!
Why You Should Join:
- Learn how to strengthen every layer of your organization's defense strategy
- Discover how to enhance incident detection and response capabilities
- Get tips to optimize security investment for maximum protection
Keynote Speaker
Evgeniy Kharam
Agenda at a Glance
- TierPoint
- Zerto
- KnowBe4
- Critical Start
- DNSFilter
- Guest Speaker
Full Agenda
-
Ed Mahoney Director Security Product Management
WIN A $300 Amazon Gift Card -
Anthony Dutra Technical Marketing Engineer
WIN A $300 Amazon Gift Card -
1 of 3 Playstation 5 Consoles!
1 of 3 Playstation 5 Consoles!
Console only, digital slim model. Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.
-
Roger A. Grimes Data-Driven Defense Evangelist
WIN A $300 Amazon Gift Card -
Securing the Border: Tactics to Mitigate Security Gaps in Modern Threat Response
Tim Bandos Field CISO
In this webinar Tim Bandos, Field CISO at Critical Start, shares insights into the most common security gaps and actionable strategies for closing them. Learn how to ensure full visibility across your IT and OT environments, monitor for log ingestion failures, and adopt automated asset discovery to reduce the risk of unseen threats.
Key Takeaways:
Understanding the Invisible Threats: Explore how missed signals, shadow IT, and unmonitored assets can undermine your security efforts.
Mitigating Security Gaps: Learn tactics such as comprehensive tooling audits, continuous log monitoring, and automated asset management to close these gaps.
Optimizing Detection and Response: Discover how asset visibility can enhance SOC and MDR effectiveness and lead to faster threat detection and response.
Real-World Case Studies: See how organizations improved their detection rates and SOC capabilities by closing critical security gaps.
If you're looking to strengthen your threat detection and response capabilities, this is a can't-miss webinar. Watch now to learn how to confront the invisible in modern threat landscapesWIN A $300 Amazon Gift Card -
Lego Star Wars AT-ATs
Lego Star Wars AT-ATs
LEGO Model 75313.
-
Mikey Pruitt Partner Evangelist
WIN A $300 Amazon Gift Card -
An Apple iPhone 16 Pro
An Apple iPhone 16 Pro
128gb, choice of color.
-
Guest Speaker
Evgeniy Kharam