Be a voice of your industry.
Speaking at BrightTALK Originals empowers you to share your expertise to over 10 million professionals, elevates your personal brand as an industry leader, and connects you with like-minded people.
To get started, simply submit your speaking proposal by filling out our form.
Benefits of Being a Panelist
Share your insight, extend your reach, and connect with the world’s brightest professionals and experts.
By speaking in a BrightTALK Original Series, you will become a trusted expert on topics relevant to your industry.
Your photo and bio prominently featured on the Series landing page, establishing you and your company as trusted and respected experts.
Filming: January 26th - 4:00 pm - 5:30 pm GMT / 8:00 am - 9:30 am PT
Vulnerability management and patching has been widely compared to the use of seat belts in cars. In terms of the level of protection provided by patching – this comparison is no overstatement. The U.S National Security Agency estimates that 85% of targeted cyberattacks would have been prevented with the patching of applications and patching of operating systems. Patching uses automation to distribute and deploy patches across thousands of devices from one console. This is especially relevant in today’s climate, as remote patching allows you to deploy patches to distributed devices.
However, some security-conscious professionals are still wary of patching, concerned that patches introduce security problems and can cause disruption. Effective and modern patching, like Avast patching solutions, addresses and solves these issues. Given that in 2019, 60% of data breaches were linked to a vulnerability where a patch was available but not applied, now is the time to implement efficient patching and vulnerability management regardless of fears.
In this session, we will:
- Discuss why patching is so important
- Share real life use cases
- Debunk fears and concerns about patching and vulnerability management
Filming: February 23rd 4:00 pm - 5:30 pm GMT / 8:00 am - 9:30 am PT
Cybersecurity has historically been very slow to adapt to change. Processes take a long time to be worked out and enforced, and security methods become forces of habit rather than innovative and efficient as a result. Digital Transformation has seen a huge wave of Cloud migration. In fact, FireMon’s State of Hybrid Cloud Security Survey found that 60% of businesses are embracing the cloud at a rate that outpaces their ability to secure it.
With such a large degree of cloud transformation, you must move away from tired cybersecurity systems, like VPNs, and move towards more modern and efficient ways of protecting your organization. Securing your Cloud transformation with a zero trust approach simplifies your cloud based management, allowing you to consistently manage from one platform. 78% of enterprises are looking to adopt a zero trust strategy. Join this session to find out why.
In this session we will discuss:
- The business benefits of ZTNA
- Replacing VPN connection with Zero Trust – and why it’s time to move away from VPNs
- Improving user experience with Avast Secure Private Access
Filming: March 23rd 4:00 pm - 5:30 pm GMT / 8:00 am - 9:30 am PT
With persistent threats on the horizon, it’s important to make sure your security measures are always doing the most for you and your organization. One of the best ways to do this is through layering. Similarly to wrapping up with layers in the winter to protect from the cold, it’s important to layer your security controls to protect your resources and data from cyberattacks.
Layering is so important, as it’s virtually impossible to keep track of all possible threats. But with a layering solution, you can protect every possible weakness. While layering has been around for a long time, new ways to apply and integrate these solutions have continued to evolve. For example, Avast delivers critical layers of security – all from the cloud.
In this session, we will discuss:
- Why layering is such a powerful cybersecurity tool
- Managing your layering solutions from a single cloud-based console
- What layers you need to protect your data
- Panelists must adhere 100% to our “NO COMMERCIALISM” Policy. If you cannot avoid commercialism, please do not agree to speak.
- Panelists must share their information in an educational, non-commercial and non-self-promotional manner.
- Panelists must provide session description for the Summit website.
Complete the form below and we will contact you.