Redefining Network Security

October 11-14, 2021

Benefits of Being a Panelist

Share your insight, extend your reach, and connect with the world’s brightest professionals and experts.

By speaking in Online Summits such as Redefining Network Security, you will become a trusted expert on topics relevant to your industry.

Your photo and bio prominently featured on the Summit landing page, establishing you and your company as trusted and respected experts.

Summit Abstract

According to the 2020 Verizon Data Breach Investigations Report (DBIR), 70% of breaches are perpetrated by external actors, making endpoint security a high priority in any security strategy. In the age of remote working, keeping track of endpoints, access and data assets is becoming ever more critical for maintaining a cyber secure organization.

We are particularly interested in best practices in:

Securing the Endpoint
October 11, 2021

Learn how to keep track of, manage and secure your endpoints in the age of remote working.

Addressing the Insider Threat
October 12, 2021

Understand user behavior and leverage the tools available to detect and prevent anomalous and malicious activity from inside your organization.

Networking Monitoring & Asset Management
October 13, 2021

Explore solutions and best practices for monitoring your networks, users and devices.

Network Security for the SMB
October 14, 2021

Discover how SMBs can better manage their security and protect their business from cyber attacks.

Thank you for your interest in Redefining Network Security online Summit. Please be aware that some of the sessions may be presented in a panel format and/or may feature multiple speakers. The decision to feature multiple speakers in any session is at the sole discretion of Summit organizers.

Panelist Requirements:

  • Panelists must adhere 100% to our “NO COMMERCIALISM” Policy. If you cannot avoid commercialism, please do not agree to speak.
  • Panelists must share their information in an educational, non-commercial and non-self-promotional manner.

Complete the form below and we will contact you.

    Please select which episode(s) you would like to participate in: Securing the EndpointAddressing the Insider ThreatNetworking Monitoring & Asset ManagementNetwork Security for the SMB
    Contact Us

    We're not around right now. But you can send us an email and we'll get back to you, asap.

    Not readable? Change text. captcha txt

    Start typing and press Enter to search