So, Bytes assembled a host of security experts from our global partners, to share their knowledge and help you succeed in an exclusive, immersive Virtual Summit. Our mission - to tackle your security challenges from the ground to the cloud, sharing best practices and new approaches to help businesses survive and thrive.
‘Security Horizons 2020’ – Now on-demand
Watch any of our sessions by clicking any of the links below.
|Talk Track 1||Talk Track 2||Talk Track 3||Talk Track 4|
|Check Point: Security for Any Shape of Cloud - Azure, AWS & Beyond||Crowdstrike: Demystifying Threat Intelligence||Exabeam: SOC Automation: Faster Decision: Faster Decision Making and Response|
|Varonis: Office 365 - Who's watching the data?||Proofpoint: Protection Starts with People; Securing A Remote Workforce in Rapidly Changing Conditions||Palo Alto Networks: Automation - the art of the possible|
|Thales: Take a Zero-Trust approach to address today's New Normal||Sophos: O365 to Azure: Securing the Cloud with Sophos||SecurityHQ: Supercharge your Firewall with a 24/7 Managed Firewall Service||Digital Shadows: Demystifying the Dark Web and Mitigating Risks|
|Forcepoint: Let's Get SASE||Okta: Okta & Microsoft - Better Together||Netskope: Prevent, Detect, Respond - The case for making cloud security more visible||DarkTrace: Cyber AI: Automating the Analyst|
|SailPoint: Rethinking Identity: The Cube Story||Zscaler: 5 Ways to Improve Your Users' O365 At-Home Experience||Check Point: Prevention v Detection: Why You Don't have to Choose...||SecurityHQ & Cyber Consulting: Detection and Response in Action: Behavioural Analytics & the Pyramid of Pain!|
|Cyber Consulting: If you always do what you always did, then you always get what you always got||Mimecast: M365 Cyber Hygiene: Built-in and Bolt-on Techniques||Illumio: When it comes to breaches - complexity confuses, simplicity solves||CATO: Why SASE is the Future of SD-WAN and Security|
|Check Point: Threats: Rising to Infinity & Beyond... How to Level the Playing Field||SailPoint: Cloud: Is Data Your Blind Spot||Palo Alto Networks: Journey to the Heart of the SOC||SecurityHQ: Using Machine Learning & AI to Hunt Risk in the Real World|
|Proofpoint: Stopping the Next wave of email threats; Understanding Business Email & Email Account Compromise||Forcepoint: How Forcepoint Enhances Your Microsoft Azure Security Posture||Okta: Security and Trust: It's all about Identity||Varonis: Big Game Ransomware - Attack Simulation|
|Crowdstrike: Stopping Breaches - Lessons from the Front Lines||DarkTrace: Caught in the Wild: Threats in Focus||Thales: Building a robust response to a Zero-Trust World||CATO: Next generation SA SE/SD Wan in Action: Live Demonstration of CATO|
|Sophos: New world, new security? Evolving to meet today's cyber security risks||Netskope: Protecting Microsoft Teams and Office 365||Mimecast: Tales of the New Cyber Frontier||Tenable: See, Predict, Act: An Innovative Way to Overcome Cyber Risk|
|Digital Shadows: How Threat Actors are Targetting Remote Workers||Zscaler: Preparing for the Reopen: What ZPA Brings to Security, User Experience and Compliance||Exabeam: A tinker, a tailor, a spy, a cat, George Michael, and William Foster...||Illumio: Zero Trsut in a Distributed Workforce|
Register for the Security Horizons 2020 event here: