top of page

2015 AGENDAS

We have included the agenda for both days below for your review. After each presentation there will be a short break. There will also be a complimentary lunch and a networking reception, free to all Insider Threat 2015 Summit guests. 

 

Please keep in mind, some of our scheduling may be subject to change and speaker slots will be filled upon first come first serve basis. No video or audio recording of any kind is permitted for the duration of the event.

 

REGISTRATION CLOSED

cyber, security, personnel, CE, continuous, APT, threat, insider, hacker, mitigation, defense, attack, technology, tech, summit, event, conference, counter, solution, network, forensics, malware, phishing, persistent, advanced, network, protection
bottom of page