Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today’s approach to data defense isn’t where it needs to be and it’s time for all enterprises, including yours, to re-think enterprise IT security.

This all-day virtual event will offer an in-depth look at some of the myths surrounding enterprise data defense –and how new technologies, better architectures and new ways of thinking could put your business on a path to a more effective enterprise security strategy.

Among the many topics that will be addressed in this online event:


Discover the IT security tools and practices you should keep or toss, for a better defense.

Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event


Learn how to “futureproof” security when cloud, mobile and IoT technologies are outside your span of control.

Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event


Find out how you stop breach and vulnerability “firefighting” by developing a structured line of defense.

Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event


Discover how threats are evolving and what future online attacks look like to prepare accordingly.

Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event

What You Will learn

Why current enterprise security technologies and practices are failing, and what can be done to reverse this trend 

 Out-of-the box ideas to make your security strategy more effective for cloud and mobile computing environments

What you can do about enterprise security when IT is changing so rapidly

Insights on how you can develop a “futureproof” enterprise IT security plan

How to develop an enterprise security architecture of tools, practices and processes; reducing the need for daily “firefighting”

The future of online threats and how you can prepare today for tomorrow’s new exploits


KEYNOTE: Re-Thinking The Philosophy Of Enterprise Security
11:00am – 12:00pm ET (followed by a 15-min Commentary Desk)

Speakers: Bruce Schneier, CTO, Resilient; Adam Vincent, CEO, ThreatConnect; Tim Wilson, Editor-in-Chief, Dark Reading

Not so many years ago, IT departments believed they could build a secure “perimeter” and defend it with technology. They believed they could teach users to embrace and use sophisticated endpoint technology. And they believed could develop a layered defense that would stop even the most determined attacker. Today, many of these beliefs – the very fundamentals of information security philosophy – are changing. In this eye-opening keynote presentation, a top security visionary explains why these fundamentals no longer apply – and offers some new thinking around enterprise defense.

KEYNOTE: Why Security Departments Fail (And What You Can Do About It)
12:15pm – 1:15pm ET
(followed by a 15-min Commentary Desk)

Speakers: James Robinson, Director, Risk & Threat Management, Office of the CISO, Optiv; Abhik Mitra, Product Marketing Manager, Code42; Sara Peters, Senior Editor, Dark Reading

Each year, companies spend more on IT security technology and staffing – and each year, the attackers seem to get better at breaching enterprise defenses. Why do enterprise security technologies and practices fail? Is it the technology that’s failing, or is it people and processes? Most importantly, what can IT organizations do to change this trend? What tools and practices should they keep – and which ones should they get rid of? One of the industry’s leading security thinkers offers some practical advice.

KEYNOTE: Preparing A Next-Generation IT Security Strategy
1:30pm – 2:30pm ET
(followed by a 15-min Commentary Desk)

Speakers: Christie Terrill, Managing Director, Bishop Fox; Michael Dalgleish, Director, Sales Engineering, LogRhythm; Tim Wilson, Editor-in-Chief, Dark Reading

One of the main reasons why information security is so hard to achieve today is that IT itself is changing so rapidly. Cloud computing puts security in the hands of a third-party service provider. Mobile technology puts security in the hands of the end user. And the emergence of intelligent, Internet-connected, non-computer devices – the Internet of Things – represents a whole new set of security challenges. How can IT organizations build a security strategy that works when so much of the computing environment is outside their span of control? How can security departments implement technologies and practices that will work not only in today’s IT environment, but in tomorrow’s dynamic, multi-dimensional computing world as well?  A forward-looking security expert offers some insight on how to develop a “futureproof” enterprise IT security plan.

PANEL: How To Build And Maintain A Comprehensive Enterprise Security Architecture
2:45pm – 3:30pm ET

Speakers: Johannes B. Ullrich, Ph.D., Dean of Research, SANS Technology Institute; Chenxi Wang, Chief Strategy Officer, Twistlock; Jeff Schilling Chief of Operations and Security, Armor; Joel Cardella, Senior Program Development, Strategic Services, Rapid7; Kelly Jackson Higgins, Executive Editor, Dark Reading

When it comes to security, today’s IT organization spends most of its time firefighting – finding breaches and vulnerabilities and remediating them before the bad guys can find them. But wouldn’t it be more efficient to develop a comprehensive set of tools, practices, and processes – a security architecture – that could provide the basic building blocks of enterprise defense – and reduce the need for daily firefighting? Top security experts discuss ways that IT organizations can reduce the daily panic by implementing a more well-considered, comprehensive line of defense.

PANEL: The Future Of The Online Threat
3:45pm – 4:30pm ET

Speakers: Cheryl Biswas, Cyber Security Analyst, Threat Intel, KPMG; Keith Brogan, Managing Director, Deloitte Cyber Risk Services; Thom Bailey, Head of Product Marketing for Sophos Central, Endpoint, MSP, and Security Analytics, Sophos; Brian NeSmith, Co-founder and CEO, Arctic Wolf; Marilyn Cohodas, Community Editor, Dark Reading

In order to develop a more comprehensive, futureproof IT security strategy, it’s important to know threats are evolving. Where will cybercrime be in three years? In five? What new exploits will attackers be using – and what vulnerabilities will they be seeking? In this provocative panel, forward-thinking security experts will offer a glimpse of the future of online attacks – and how your organization can prepare today for tomorrow’s new exploits.


  • Abhik Mitra
    Abhik Mitra Product Marketing Manager, Code42

    Abhik is a product marketing manager at Code42 and brings more than 10 years of experience in enterprise technology. He is the strategic conduit between the customer and Product Management, Sales and Marketing teams. He is passionate about creating compelling content and communications to demonstrate the strengths of tech solutions.

  • Adam Vincent
    Adam Vincent CEO, ThreatConnect

    Adam is an information security expert and is currently the CEO and a founder at ThreatConnect, Inc. He possesses over a decade of experience in programming, network security, penetration testing, cryptography design & cryptanalysis, identity and access control, and a detailed expertise in information security.

  • Brian NeSmith

    Brian brings more than 30 years of experience to Arctic Wolf Networks. In his previous position as CEO of Blue Coat Systems, he led the company’s growth from $5M to over $500M per year as the industry’s leading web proxy platform. Prior to that, Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls.

  • Bruce Schneier
    Bruce Schneier CTO, Resilient

    Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of 13 books–including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World–as well as hundreds of articles, essays, and academic papers.

  • Chenxi Wang, Ph.D
    Chenxi Wang, Ph.D Chief Strategy Officer, Twistlock

    Dr. Chenxi is responsible for corporate strategy and marketing. Prior to Twistlock, Chenxi built an illustrious career at Forrester Research, Intel Security, and CipherCloud. At Forrester, Chenxi covered mobile, cloud, and enterprise security, and wrote many hard hitting research papers. At Intel Security, she led the ubiquity strategy that spans both hardware and software platforms.

  • Cheryl Biswas
    Cheryl Biswas Cyber Security Analyst – Threat Intel, KPMG

    Cheryl Biswas is part of KPMG Canada’s cybersecurity team in threat Intel. She is fascinated by APTs, and passionate about securing mainframes, and ICS Scada. She builds bridges as well as building security awareness. She holds a specialized honors  degree in political science, and is ITIL designated. In addition to speaking at  BSidesLV, Circle City, BSidesTO and the upcoming SecTor, Cheryl has been a guest on podcasts and television, and is an active writer and blogger. You’ll find her on Twitter as @3ncr1pt3d.

  • Chris Martin
    Chris Martin Principle Sales Engineer, LogRhythm

    Chris Martin is the Principal Sales Engineer at LogRhythm, based out of New York. Chris has over a decade of experience in IT security, working across a number of sectors including banking, legal, government and public sector throughout EMEA, APAC and the U.S.

  • Christie Terrill (CISSP)
    Christie Terrill (CISSP) Partner, Bishop Fox

    Christie is a Partner at Bishop Fox, a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. She has accumulated more than a decade of information security experience. Christie currently leads Bishop Fox’s Enterprise Security practice, where she oversees all projects related to security governance, risk management, compliance, and technical controls.

  • James Robinson
    James Robinson Director, Risk and Threat Management, Office of the CISO, Optiv

    James Robinson is responsible for our internal information risk management and threat management programs within information security and is a member of the Office of the CISO for Optiv. Robinson uses real world experiences to help enterprise-level organizations to solve their security and related business issues.

  • Jeff Schilling
    Jeff Schilling Chief of Operations and Security, Armor

    Jeff Schilling (Col., rtd.) is responsible for the cyber and physical security programs for the corporate environment and customer hosted capabilities. Jeff retired from the US Army after 24 years of service in July 2012. In his last assignment, he was Director of the Army’s global Security Operations Center under US Army Cyber Command.

  • Joel Cardella

    Joel Cardella has over 24 years of experience in information technology, having run a gamut from network operations, sales support, data center management, field operations and information security. He has worked in industries including telecommunications, healthcare and manufacturing.

  • Johannes Ullrich

    As Dean of Research for the SANS Technology Institute, Johannes is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now the data collection engine behind the ISC. In 2004, Network World named him one of the 50 most powerful people in the networking industry.

  • Keith Brogan
    Keith Brogan Managing Director, Deloitte Cyber Risk Services

    Keith Brogan has more than 15 years of comprehensive experience in developing and leading high-performing teams globally for organizations in multiple sectors providing a broad range of cyber security advisory and consulting services. Keith currently spends the majority of his time in the field helping Deloitte’s clients solve their most complex cyber security issues.

  • Kelly Jackson Higgins

    Kelly Jackson Higgins is Executive Editor at Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, CommunicationsWeek, Virginia Business magazine, and other major media properties.

  • Marilyn Cohodas

    Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting enterprise Windows platforms and technologies.

  • Michael Dalgleish
    Michael Dalgleish Director, Sales Engineering, LogRhythm

    Michael Dalgleish is a Director of Sales Engineering at LogRhythm, where he has built a team of security professionals who are growing strategic relationships with the partner community. Michael is an industry veteran, spending the last 15 years deeply entrenched in the network and security world. When not on the road evangelizing security intelligence and SIEM, Mr. Dalgleish spends a majority of his time researching the latest attack vectors, kill chains and advanced evasion techniques.

  • Sara Peters

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law.

  • Thom Bailey

    Thom Bailey brings 20+ years of technology experience mapping requirements to unique customer needs in his role as Head of Product Management, Sophos Cloud. A thought leader in change and configuration management, security and the hybrid cloud, Thom routinely speaks at conferences around the world.

  • Tim Wilson

    Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.


Get an insider look at these key spaces in this virtual event, prior to attending:

  • Lobby: Where you arrive once you register and login
  • Content zones: Where you can collect resources like white papers
  • Auditorium: Where you view webinars and panel sessions


If the IT security industry is ever to gain ground on the rapidly-evolving new generation of online attackers, its leaders must pause their battle against the latest threats and ask questions about efficacy of today’s IT security wisdom. Dark Reading’s Re-Thinking Your Enterprise IT Security Strategy will help you to reconsider some of the underlying assumptions behind your IT defense strategy – and perhaps see information security in a way you’ve never thought of before. Today’s security strategies not only require you to know where the challenges are now, but where they’re going. Register today!




Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event
Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event
Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event


Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event
Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event
Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event
Re-Thinking Your Enterprise IT Security Strategy A DarkReading Virtual Event