Schedule Builder

View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.

Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.


Beyond Cybersecurity: Why, How and What Do You Need to Know about Cyber Resilience?

Anyck Turgeon (Cyber-Resiliency Specialist, IBM)

Date: Wednesday, May 22

Time: 9:00am - 9:45am

Pass type: All Access, Conference - Get your pass now!

Track/Topic: Security, Infrastructure

Audience: All

Format: Conference Session

Vault Recording: TBD

Audience Level: All

Per the 2018 Ponemon Institute report, organizations keep on spending more money on cybersecurity, yet the time to identify breaches, minimal remediation costs as well as the criticality of attacks are increasing. Small to large organizations are now facing billions to trillions of attacks daily. With $3.5 Billion potentially at stake, no organization can afford cyber crashes as experienced by Amazon upon its Prime Day. Cybersecurity remains a painful afterthought behind core competency performance. As we are now entering a new era of lethal Nation State-driven cyber-attacks in which hospitals, chlorine plants and energy grids are being targeted, key decision makers are now growing concerned about their ability to keep on delivering core capabilities. Decision makers want continuous revenue generation whereas consumers demand 24x7 solutions.

Aiming towards zero downtime, learn how to integrate cyber resilience as part of your current daily activities. Experience different cyber resilience solutions that can best meet your needs upon different timeframes (left vs. right of the cyber boom.) Learn about cybersecurity versus cyber resilience configuration considerations as well as architectures that can be customized to meet your needs while automating your increasing governance, risk management and compliance requirements.