Security Horizons 2020

With threat levels and digital transformation at an all time high, there has never been a better time to explore the risks and opportunities on the horizon, gathering strategies to remain secure, agile and resilient. 

So, Bytes assembled a host of security experts from our global partners, to share their knowledge and help you succeed in an exclusive, immersive Virtual Summit. Our mission - to tackle your security challenges from the ground to the cloud, sharing best practices and new approaches to help businesses survive and thrive. 

‘Security Horizons 2020’ – Now on-demand

Watch any of our sessions by clicking any of the links below.

Talk Track 1 Talk Track 2 Talk Track 3 Talk Track 4

Mimecast: Applying Threat Intelligence for Cyber Resilience

Check Point: Security for Any Shape of Cloud - Azure, AWS & Beyond Crowdstrike: Demystifying Threat Intelligence Exabeam: SOC Automation: Faster Decision: Faster Decision Making and Response

Tenable: Evolving to Risk-Based Vulnerability Management

Varonis: Office 365 - Who's watching the data? Proofpoint: Protection Starts with People; Securing A Remote Workforce in Rapidly Changing Conditions Palo Alto Networks: Automation - the art of the possible
Thales: Take a Zero-Trust approach to address today's New Normal Sophos: O365 to Azure: Securing the Cloud with Sophos SecurityHQ: Supercharge your Firewall with a 24/7 Managed Firewall Service Digital Shadows: Demystifying the Dark Web and Mitigating Risks
Forcepoint: Let's Get SASE Okta: Okta & Microsoft - Better Together Netskope: Prevent, Detect, Respond - The case for making cloud security more visible DarkTrace: Cyber AI: Automating the Analyst
SailPoint: Rethinking Identity: The Cube Story Zscaler: 5 Ways to Improve Your Users' O365 At-Home Experience Check Point: Prevention v Detection: Why You Don't have to Choose... SecurityHQ & Cyber Consulting: Detection and Response in Action: Behavioural Analytics & the Pyramid of Pain!
Cyber Consulting: If you always do what you always did, then you always get what you always got Mimecast: M365 Cyber Hygiene: Built-in and Bolt-on Techniques Illumio: When it comes to breaches - complexity confuses, simplicity solves CATO: Why SASE is the Future of SD-WAN and Security
Check Point: Threats: Rising to Infinity & Beyond... How to Level the Playing Field SailPoint: Cloud: Is Data Your Blind Spot Palo Alto Networks: Journey to the Heart of the SOC SecurityHQ: Using Machine Learning & AI to Hunt Risk in the Real World
Proofpoint: Stopping the Next wave of email threats; Understanding Business Email & Email Account Compromise Forcepoint: How Forcepoint Enhances Your Microsoft Azure Security Posture Okta: Security and Trust: It's all about Identity Varonis: Big Game Ransomware - Attack Simulation
Crowdstrike: Stopping Breaches - Lessons from the Front Lines DarkTrace: Caught in the Wild: Threats in Focus Thales: Building a robust response to a Zero-Trust World   CATO: Next generation SA SE/SD Wan in Action: Live Demonstration of CATO
Sophos: New world, new security? Evolving to meet today's cyber security risks Netskope: Protecting Microsoft Teams and Office 365 Mimecast: Tales of the New Cyber Frontier Tenable: See, Predict, Act: An Innovative Way to Overcome Cyber Risk
Digital Shadows: How Threat Actors are Targetting Remote Workers Zscaler: Preparing for the Reopen: What ZPA Brings to Security, User Experience and Compliance Exabeam: A tinker, a tailor, a spy, a cat, George Michael, and William Foster... Illumio: Zero Trsut in a Distributed Workforce



Register for the Security Horizons 2020 event here:

By submitting your information, we will use it to communicate with you regarding this event and our other events, webinars and services. For further detail, please read our privacy policy.

Want a Quote? Just tell us what you need

Need Advice? We can help with your next project

Register Your Interest in DaaS

Email Call