By clicking submit, I consent to the use of my personal data in accordance with Panorays Privacy Policy. You can unsubscribe from emails at any time, and we will never pass your email onto third parties.

Register for the webinar

Many organizations are struggling to keep up with an onslaught of significant regulations like GDPR, CCPA, the New York Shield Act and more. Some of this legislation appears to overlap, while some seems to be contradictory. How can organizations sort out this tangled regulatory web?

Submit your questions for a discussion with risk and compliance expert Dov Goldman, who will cover compliance best practices and how your organization can keep up with 2020’s extensive regulatory requirements. 


Does customer data leave the vendor’s production systems under any circumstances?

Does the vendor support single sign-on? 

Does the vendor have an employee security awareness program?

In this webinar, you will:

  • Learn more about GDPR, CCPA and regulatory trends
  • Discover how to implement best practices for privacy requirements
  • Hear about the regulatory challenges that your peers are facing
  • Find out how to reduce time and money complying with regulations

If your organization must comply with regulations, this is a webinar you can’t afford to miss! 

Taking Your Third-Party Security Program to the Next Level

1

2

3

Demi is an expert at building communities and networks, both online and offline. His technical background enables him to provide visibility into companies’ seemingly blind spots and build large systems to empower users through insight-sharing. Demi is a recognized Google Developers Expert, co-founder of “Big Things” — one of the largest big data communities — and of the local Google Developer Group Cloud. He is a renowned international speaker, presenting big data solutions and distributed and scalable systems to both technical and management teams.

!

If your organization is looking to improve its third-party security program, this is a webinar you can’t afford to miss!  
Can’t make it? Register anyway. We will send you the recording.

If your organization is looking to improve its third-party security program, this is a webinar you can’t afford to miss!  
Can’t make it? Register anyway. We will send you the recording.

About the Speakers:

The SolarWinds Breach:

Hitting the Kill-Switch During a 
Supply Chain Attack

Tuesday, January 19 
9 am PT | 12 pm ET | 5 pm UK

We can all agree that trying to predict a massive security breach like what happened with the IT management company SolarWinds, one of the most significant supply chain attacks in recent history, is impossible. 

However, we need to have a game plan for WSHTF. Doing so helps us better understand the steps to take, conduct proper risk management and remediation, and prepare a “kill-switch” to isolate the problem. 

How can this be achieved?

In this webinar, we’ll discuss how to:

Demi Ben-Ari
CTO and Co-Founder, Panorays

We’ll share our experiences with numerous security practitioners implementing their own mitigation strategies, as well as address sophisticated cases like the SolarWinds breach.

Nathan is passionate about bringing new technologies to market to solve real problems. Prior to his position at Axionus, he held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree and CloudLock (acquired by Cisco). He is a frequent speaker and contributing author on topics related to the intersection of collaboration and security.  

Nathan Burke
Chief Marketing Officer, Axonius 

Dan Trauner
Director of Security, Axonius

Daniel Trauner leads the implementation of security and IT practices for a distributed and rapidly growing team at Axionus. Previously, he was the director of platform security at Bugcrowd, where he worked with thousands of security researchers worldwide who collectively attempted to understand, break and fix anything that companies would let them.

The SolarWinds Breach:

Hitting the Kill-Switch During a 
Supply Chain Attack

We can all agree that trying to predict a massive security breach like what happened with the IT management company SolarWinds, one of the most significant supply chain attacks in recent history, is impossible. 

However, we need to have a game plan for WSHTF. Doing so helps us better understand the steps to take, conduct proper risk management and remediation, and prepare a “kill-switch” to isolate the problem. 

How can this be achieved?

Tuesday, January 19 
12 pm ET | 5 pm UK

Gain visibility of your company assets

Achieve control of your environment

Be informed about your infrastructure 

Understand your supply chain landscape

In this webinar, we’ll discuss how to: