Karthik Kanakarajan is an Information Security Leader with over 20 years of experience in Cybersecurity, Risk & Compliance, Vulnerability Management, Internal Audit, Business Continuity, and ...
Anand Thangaraju (CISO at ePlus Inc.) is a technology evangelist and Field CISO who connects AI, cybersecurity, risk, and fintech. He works closely with executive leaders as a security practitioner ...
Ashok Kakani is an experienced CISO and Information Security leader with over 28 years of expertise across the Technology, Insurance, and Banking sectors. He brings extensive experience in security ...
Pavan Kushwaha is the Founder & CEO of Kratikal and Threatcop and a Certified Information Systems Auditor (CISA). His cybersecurity journey began in 2013 after a firsthand encounter with a ...
Laura Sawka is the Founder and GRC Executive of Sawka Advisory Group and former SVP of Security GRC at Salesforce. With deep expertise in governance, risk, and compliance, she helps organizations turn ...
The central theme of Preetham Nayak’s address is the disconnect between traditional, mandatory security training and the real-world psychology of social engineering. For many organizations, security ...
Even the most sophisticated Incident Response (IR) can collapse when the first responder, an employee, does not have an idea of what to do. Generally, organizations lay their focus on investing ...
Aruneesh Salhotra’s address focuses on the psychological motivations behind training completion and the rising threat of AI-driven social engineering. He observes that in many organizations, training ...
The focus of this address is the transition from traditional, completion-based compliance training to a more sophisticated, outcome-based strategy that utilizes AI to measure behavioral change. For ...
Many organizations can instantly report patch compliance, endpoint protection, or the status of firewalls. However, they aren’t able to answer a critical question: “How exposed are our people right ...
The Future of Email Defense: Shifting from Identity to Intent As cyberattacks become increasingly sophisticated, the industry is moving toward a granular infrastructural level of security known as ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results