Visit us at stand R50

Effortless security outcomes powered by automation.

Visit with our security experts for live demonstrations and giveaways! Get a walkthrough of the Varonis Data Security Platform and join us for specialized talks on data security, data privacy, and data protection.

 

Speakers

Tuesday June 20, 12:00 - 12:25 p.m.

DSPM Deep Dive: Debunking Five Data Security Myths

LOCATION: Technology Showcase Theatre


The cybersecurity software market is evolving almost as fast as China’s APTs and it seems every month we have a handful of new acronyms to add to our alphabet soup!
In this session, we’ll break down the four hottest letters in cybersecurity right now: DSPM.
We will cut through the marketing hype, debunk five common myths about Data Security Posture Management, and outline the successful data security strategy used by CISOs we’ve been talking to.

William Priestley Presented by William Priestley, SE Manager
Wednesday June 21, 12:00 - 12:25 p.m.

The Secret Life of Teams: What Really Happens Behind the Scenes

LOCATION: Technology Showcase

Do you know what really happens behind the scenes when a user creates a new Team in Microsoft 365? It's more than you think.

And do you know where files go when you share them with a Teams channel? (Hint: check SharePoint).


As an M365 admin, can you see which sensitive files have been shared outside a Team via a sharing-link?

Andy will walk you through these common challenges we see in the field. We'll show you how Varonis can help you get the visibility and control you need to keep M365 data secure and compliant.
Andrew Dreier Presented by Andrew Dreier, Sales Engineer
Thursday June 22, 13:00 - 13:25 p.m.

Insider Threats: The Pain in Your SaaS

LOCATION: Strategy Talks

The cloud offers malicious insiders a plethora of vectors to exploit for fun, profit ― and sometimes revenge. Matt will present a series of stand-out real-world cloud insider attacks uncovered during first-hand incident response investigations ― from a careless insider exploiting collaboration features, to a technical insider modifying obscure configuration settings, to a crafty insider impersonating executives, and more. Matt will break down, step-by-step, how these insiders carried out their nefarious activities and how they were caught red-handed. Names will be changed to protect the innocent (and not-so-innocent)! With each in-depth scenario, Matt will explain how these attacks were investigated and how security teams can detect and mitigate similar attacks.
 
Key Learnings:
-How the cloud offers seemingly infinite possibilities for insiders to steal data
-The impact of insiders on an organization’s security posture
-Why ‘Trust but Verify’ doesn’t escape the cloud
-How malicious insiders exploited SaaS applications
-How cloud security configuration management works -How to build your insider threat detection, investigation, and response programs to stay ahead of evolving cloud threats
 
This is a must-see session for security staff working with popular cloud technologies and applications, including Salesforce, Okta, Zoom, GitHub, and Slack.
matt_lock Presented by Matt Lock, Technical Director UK&I

Meet with us!

Schedule a meeting, get a 1:1 demo, or meet our executives.