Loading…
Venue: Club Room clear filter
arrow_back View All Dates
Thursday, September 18
 

10:20am PDT

Managing Vulnerabilities – What Does Success Look Like in 2025
Thursday September 18, 2025 10:20am - 11:00am PDT
Vulnerability Management can be seen as one of the basic tenants of a security function in any organization. While supposedly basic, given the ever increasing frequency of data breaches, managing vulnerabilities across an organization is far from being straightforward. How an organization approaches vulnerability management and penetration testing in the past simply does not work with todays technology stack and development methodologies.

From attack surfaces and figuring out what needs to be protected, to fixing vulnerabilities, we take a look at how vulnerability management has evolved over the years. Backed up by real world data, we will discuss topics such as risk prioritization, the dynamic nature of measuring vulnerabilities and how AI can also now help focus our resources. We delve into metric-driven success criteria to see how organizations measure their own programs. What does good look like and am I at least faring better than my peers!
Speakers
avatar for Rahim Jina

Rahim Jina

Co-Founder & COO, Edgescan
Rahim is the Co-Founder & COO of Edgescan, a CTEM (Continuous Threat & Exposure Management) solution. Rahim is responsible for operational excellence; he has extensive experience delivering penetration testing services to a wide range of organizations globally. Prior to Edgescan... Read More →
Thursday September 18, 2025 10:20am - 11:00am PDT
Club Room

12:05pm PDT

Solution Spotlight
Thursday September 18, 2025 12:05pm - 12:25pm PDT
Thursday September 18, 2025 12:05pm - 12:25pm PDT
Club Room

12:30pm PDT

Bob Zukis
Thursday September 18, 2025 12:30pm - 1:10pm PDT
Coming Soon. 
Speakers
avatar for Bob Zukis

Bob Zukis

Founder and CEO, Digital Directors Network
Bob is the Founder and CEO of Digital Directors Network. He is one of the world’s leading advocates and experts on digital and cybersecurity governance and an educator and advisor to corporate directors worldwide. He leads an organization of over 1,600 directors, CEOs CIOs, CISOs... Read More →
Thursday September 18, 2025 12:30pm - 1:10pm PDT
Club Room

1:25pm PDT

The Future of Product Security: AI, Quantum Computing, and the Evolving Threat Landscape
Thursday September 18, 2025 1:25pm - 2:05pm PDT
The rapid evolution of AI and Quantum Computing is reshaping the security landscape, challenging traditional models, and demanding a paradigm shift in product security. AI is a double-edged sword, empowering defenders while simultaneously enhancing attackers’ ability to automate, evade detection, and steal sensitive data.

Quantum Computing, on the other hand, threatens to break modern cryptographic standards, requiring proactive preparation to secure the future. This session will provide practical insights and a roadmap to help security leaders leverage AI for defense, mitigate emerging AI risks, and transition toward quantum-resistant architectures before threats become reality.
Speakers
avatar for Jacob Combs

Jacob Combs

Medical Device Security Consultant, Darroch Medical Solutions
Jacob Combs is a dynamic cybersecurity leader and seasoned CISO known for building world-class security programs at the intersection of innovation, regulation, and risk. With deep expertise in medical device security, AI-driven threat mitigation, and global compliance, Jacob brings... Read More →
Thursday September 18, 2025 1:25pm - 2:05pm PDT
Club Room

2:10pm PDT

The Ultimate Solution to the Authentication Problem
Thursday September 18, 2025 2:10pm - 2:50pm PDT
Passwords were introduced over 60 years ago to ensure the security of accounts within controlled computing environments. However, the advent of the Internet has significantly transformed the landscape of account security, as we now must protect our accounts from billions of potential threats globally. The emergence of sophisticated malware further complicates this issue, rendering even the most complex passwords insufficient for ensuring security.

Additionally, the prevalent practice of using email addresses as a component of the authentication process poses a further risk, as these addresses are publicly accessible and effectively expose half of the login credentials. Consequently, the traditional password security model is fundamentally flawed. Attempting to enhance this model with supplementary security measures is akin to attempting to navigate a sinking ship.

Given these challenges, what is next for better authentication?
Speakers
avatar for Jack Bicer

Jack Bicer

CTO, Septium Corporation
With over 40 years of experience in the software industry, Jack Bicer has served more than 20 years as a Chief Technology Officer. Throughout his career, he has successfully developed innovative products and managed various dot-coms and cybersecurity companies, establishing himself... Read More →
Thursday September 18, 2025 2:10pm - 2:50pm PDT
Club Room
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -