Month: February 2020

CheckPoint at RISK 2020: CYBER SECURITY INNOVATIONS THAT MATTER BY CHECK POINT
About the presentation: The traditional security perimeter is disappearing, being replaced by border-less workplaces where data roams freely

Radware at RISK 2020: The Artificial Reality of Automated Threats
Efficiently mitigating cyber threats in the digital era Session abstract: In this session we’ll review the enterprise trends in the digital

ADD at RISK 2020: Kaj pridobite z uporabo Netwrix rešitve?
About the presentation: Netwrix Auditor je rešitev, ki omogoča nadzor nad spremembami (Change Audit) v hibridnih IT okoljih naročnika. Rešitev

INFOBLOX at RISK 2020: DNS in offensive techniques
Presentation abstract: Let’s examine the many ways criminals exploit the unique properties of DNS. Attend this session and discover:• The

S&T Slovenia at RISK 2020: Vaš sistem je kriptiran, kaj pa sedaj?
Učinkovit odziv po zaznanem varnostnem incidentu Seveda je pomembno, da incident pravočasno zaznate, po možnosti še preden se zgodi najhuje. A ko

FireEye at RISK 2020: Emerging technologies for Espionage Tradecraft
This presentation will discuss the confluence of emerging technologies such as 5G, IOT, Quantum Computing and AI to demonstrate how adversaries
Orchestra Group at RISK 2020: “New attack-surface overview: The IoT and smart connected devices challenges around Enterprises’ airspace.”
An Enterprise-Grade Cybersecurity dome that fills the IoT cybersecurity-gap Presentation abstract: We are surrounded by billions of connected

ExtraHop at RISK 2020: ExtraHop NDR – Better outcomes with fewer resources.
Presentation abstract: Examining how the use of Machine learning combined with network inputs can increase security, reduce management overheads

VMware at RISK 2020: Rethink the Way You Secure Your Organisation with Intrinsic Security
Presentation abstract: There has never been a more challenging nor exciting time in security. Sophistication of attackers, security threats,

ThreatQuotient at RISK 2020: Leveraging Threat Intelligence for Effective Vulnerability Management
Workshop abstract: Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to data