Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • This preview of the largest Government Focused Technology Event on the West Coast will give attendees an overview of what they can expect at the 2018 Revolutionary Technologies Expo happening May 2 & 3, 2018 at Cal Expo in Sacramento, CA If you would like to be a part of this event or to keep informed about updates, make sure you subscribe :) For More Information on this Event visit the Web Site...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • This preview of the largest Government Focused Technology Event on the West Coast will give attendees an overview of what they can expect at the 2018 Revolutionary Technologies Expo happening May 2 & 3, 2018 at Cal Expo in Sacramento, CA For More Information on this Event visit the Web Site at RevTechX.com If you would like information on any future PSP Forums, please visit our event site at www...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session #18: Find Map, Locate Treasure, Avoid Pirates- A Holistic Approach to Info Risk & Protection (Guadalupe) Speaker: Cindy Compert, CTO Data Privacy, IBM Security Division Description: Ultimately the target of bad actors is your valuable data. Are you doing enough to protect the data that is critical to your organization and customers? The best practices for Information Risk and Protecti...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 09: Manage Your Users & Applications Across a Hybrid and Cloud Environment Speaker: Subbu Iyer, Sr. Director, Product Management for Identity Access Management & Security, Oracle Panel Moderator: Thom Locke, Vice President Security, Bias Corporation Additional Panel Members: Manuel Fernandes, TSM - Security Solutions, Oracle Description: As the perimeter fades, a new perimeter is iden...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 25: Leverage DNS and IP Data to Prevent Data Exfiltration, Ransomware, etc. Speaker: Prakash Nagpal, VP Product Marketing, Infoblox Description: Today’s evolving network environment is no less epic than the industrial revolution. There is so much change going on–billions of active Internet users and connected devices, adoption of cloud and SDN, and new trends like IoT. These changes in...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 1: Rock Drops and Dragons' Teeth - Instrumenting for the Breach Speaker: Justin Edgar, Solutions Architect, FireEye Description: In this session, we will briefly examine the breach preparedness strategy currently deployed South of the Korean De-Militarized Zone (DMZ). We will use this metaphor to examine current best practices for network breach preparation across sector-relevant thre...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 23: CA Public Records Laws- Mitigating Social and Mobile Compliance Risks Panel Moderator: Mike Pagani Sr. Director of Product Marketing and Chief Evangelist Smarsh Additional Panel Members: Jackson Muhrwe, PhD, Interim City Chief Information Security Officer, City/County of San Francisco Shawn Savadkohi, Information Security Officer, San Mateo County Health System Bonnie Page,General Cou...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 15: Who, What, Where, When and Why's around CLOUD SECURITY! Speaker: Vaishali Patel, Zscaler Description: Our focus session will be in regards to Cloud Security: 1. Everything from basics (what to look for in cloud security vendors, what compliance status have they received ISO, SOC2, FedRamp, CJIS, etc) to 2. Why move to cloud security vs traditional hardware (as org's move to O365/S...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 2: Securing Smart Cities Shouldn’t Make You Wanna Cry Speakers: Tony Gillespie, US Public Sector Strategist, ForeScout Technologies Rob Lloyd, CIO, City of San Jose Description: The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with a...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 22: Multi-Vector DDoS Attacks: What they are, how they work and how to mitigate them Speaker: Jose Gomez, Senior Sales Engineer, Imperva Description: DDoS attacks are increasing at an astronomical rate every year; in 2017 Q2 alone we had reports of attacks on 86 countries. Minimize damage to your agency by learning more about what an attack consists of and what you can do to manage them...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 17: Threat-Centric Vulnerability Remediation and Predictions for Cyber Security Speaker: Eric Anderson CTO,Security Operations, BMC Description: This session will focus trends, insights and lessons learned from Gartner’s cybersecurity summit. Once a year, Garner brings together cyber security professionals, vendors and CISO’s to discuss industry trends, new threats, tactics and strate...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 12: Rinse & Repeat - Good Security Hygiene Speaker: Jason Truppi, Director, Tanium Description: News headlines continue to repeat that the cyberthreat landscape is constantly changing. But is it really? The main sources of major breaches continue to remain phishing emails, drive-by downloads and web-application vulnerabilities. And the root cause for these breaches remains a lack of b...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 4: Risk Mgmt- If There is a Conversation You've Been Avoiding - That's the One to Have Speaker: Malcolm Harkin, Chief Security and Trust Officer, Cylance Description: The biggest vulnerability we face today and in the future, is the misperception of risk. A perfect storm of risk has been brewing for decades and has hit with full force the past few years. It has moved from a backroom i...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 19: Allied Intelligence Sharing for Proactive Cybersecurity Moderator: Rob Lloyd, CIO, City of San José Panel Members: • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance • Raj Patel, CISO, City of Palo Alto • Dave Halla, Senior Advisor, Johns Hopkins University, Applied Physics Laboratory Session Description: Cyber-attacks on the nation's critical infrastructure and ...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 5: How to Leverage Virtualization to Secure Critical Applications Speaker: Chris Corde, Sr. Director of Product Management, VMware, Networking & Security Business Unit Description: In any modern data center, application workloads are provisioned, moved and decommissioned at will. At the same time, what we need for every single system that is deployed, is to secure all traffic without c...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 11: Keeping the Enterprise Always On with IT Resilience Speaker: Don Rush, Systems Engineer, Zerto Description: Your organization is always running and cannot afford downtime during a disaster or the traditional time it takes to recover from a security event. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters w...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 24: Securing the end point - the most targeted access point! Speaker: TBD, Entisys360 Description: This session with be a conceptual discussion identifying the numerous risks that end point devices such as PCs, laptops, tablets, and smart phones present to the security of your enterprise and its data. End point devices are the single most vulnerable and targeted devices that account ...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 22: Multi-Vector DDoS Attacks: What they are, how they work and how to mitigate them Speaker: Jose Gomez, Senior Sales Engineer, Imperva Description: DDoS attacks are increasing at an astronomical rate every year; in 2017 Q2 alone we had reports of attacks on 86 countries. Minimize damage to your agency by learning more about what an attack consists of and what you can do to manage them...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 16: The Key to Prioritized Risk Reduction and Cyber-Excellence Speaker: Ted Gary, Sr. Product Marketing Manager, Tenable Description: Government agencies, regardless of size, IT resources and budget, are faced with complying with California Assembly Bill 670 which mandates periodic cybersecurity risk assessments on state networks. Adhering to the CIS Controls, formerly known as the SAN...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 10: Building the Blueprint for Information Security Speaker: Shaun Land, Shaun Land, Consulting CTO/CISO, Dyntek Description: Join us for a discussion on how to simplify the risk management process through defined and prioritized security controls and policy and procedure templates that align with industry standards such as NIST and COBIT 5. We will review creating security safeguard...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 3: Deploying cloud security against evolving techniques and tactics Speaker: Jeff Stout, Akamai Technologies Description: In today's hyper connected world there are more vulnerabilities on more devices then ever before. The attackers' capability to launch sophisticated cyber attacks as well as overwhelming DDoS (distributed denial of service) attacks has been commoditized as criminal o...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 14: SANS - NIST CyberSecurity Framework usage, overview and 5-year plan (Salon V) Speaker: Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS Description: Brian Ventura, Information Security Architect and SANS instructor will discuss NIST published the Cybersecurity Framework (CSF). What is this, why do I care and how can I use it to manage my sec...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Session 7: SANS Session - Incident Response: 7 phases of IR - have a plan. Speaker: Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS Description: One of the most important phases of an Incident Response is having a plan. Let’s work through the scenario when something strange is happening on our network. What do we do? If we have established a plan of tim...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • 2017 Cyber Security Symposium Luncheon Keynote: What Are Successful Strategies for Protecting Local Government Information Raj Patel, CISO for the City of Palo Alto will moderate an Executive Panel of Cyber Experts from Local Government and Private Sector. Panel Members: • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance • Rob Lloyd, CIO, City of San José • Dave Halla, Senio...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • 2017 Cyber Security Symposium Luncheon Keynote Part 2: What Are Successful Strategies for Protecting Local Government Information Raj Patel, CISO for the City of Palo Alto will moderate an Executive Panel of Cyber Experts from Local Government and Private Sector. Panel Members: • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance • Rob Lloyd, CIO, City of San José • Dave Halla...

Public Identity, Inc.
Public Identity, Inc.
YouTube Video
  • Opening Remarks Executive Sponsors for the 2017 Cybersecurity Symposium: Raj Patel, Chief Information Security Officer, City of Palo Alto Jackson Muhirwe, PhD, Chief Information Security Officer, City and County of San Francisco This video was filmed at the June 7, 2017 Leveraging Data Forum in Sacramento, CA If you would like information on any future PSP Forums, please visit our event site at...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.