About
You can't live with it, and you certainly can't live without it. Security is everywhere — behind every highly performant application, or even detected threat, there is a powerful security system and set of processes implemented. And in the off chance there are NOT such systems in place, that fact will quickly make itself known. We are living in an entirely new world, where bad actors are growing more and more sophisticated the moment we make ourselves "comfortable."

Join DZone and a panel of experts as we discuss fastest emerging techniques and nuances in the security space, exploring key topics like software supply chains, the role of AI/ML in security, cloud-native application protection, network security, and much more.
When
Wednesday, September 25, 2024 · 3:00 p.m. Eastern Time (US & Canada) (GMT -4:00)
Agenda
  • Software Supply Chains
  • The Role of AI/ML in Security
  • Cloud-Native Application Protection
  • Network Security
Presenters
1721157972-4e318da1393ab95e
Jesse Davis
Moderator, CTO, DZone
As the Chief Technologist @ DZone, Jesse is responsible for guiding the strategic direction of products and helping customers build the world’s largest, most engaging developer communities for companies like Disney, Amazon, SAP, Pixar, and Unity. Jesse has been building enterprise software and engineering teams for 25 years and is a respected executive, author, speaker, and coach.
1724245680-00af93480294f5fc
Akanksha Pathak
Senior Cybersecurity Consultant, Visa Inc.
Akanksha specializes in cloud and application security, TDR, and vulnerability management. As a senior member of the corporate governance team, she oversees the third-party cybersecurity. Her expertise lies in managing relationships while also architecting and analyzing application designs. Additionally, she is an active participant in cybersecurity communities like GIAC Advisory Board and IEEE.
1724245735-6be03074b54a3f04
Matt Lembright
Global Lead Data/Search, Censys
Matt Lembright is a Senior Security Researcher at Censys. He works with Federal organizations to find exposed assets, threat actors, and accomplish missions with Censys' detailed datasets and products gained from our 24-hour scans of the entire internet. Lembright served in the U.S. Army from 2006 to 2014 as an intelligence officer, first leading a tactical targeting team in Baghdad, and then went on to create the Army's Cyber Opposing Forces, led by Lembright in the first Cyber Flag event. He then commanded a company in the 780th MI Brigade, responsible for creating some of the first operational cyber mission teams of the Cyber Mission Forces (CMF). After his Army career, Lembright consulted Army Cyber in resourcing the rest of their CMF and as a solutions engineer and security leader at cybersecurity startups.
1666724878-095179c1fafea830
Pratik Prakash
Principal Solution Architect, Capital One
Pratik is a seasoned solution architect and open-source advocate who blends a passion for engineering with hands-on experience in multi-cloud and data science. In past engineering roles, he played a crucial role in leading engineering teams through the transformative process of tech modernization, building multi-cloud platforms, scalable and resilient cloud-native app ecosystems, and global hybrid mobile apps.
1725452249-9ea29303404c0cfe
Josephine Eskaline "Joyce"
Chief Architect, IBM India Pvt Limited
Josephine Eskaline Joyce, an IBM Master Inventor with over 23 years in IT, has extensive expertise in cloud architecture, security, and enterprise solutions. She holds multiple patents, has published research papers, and is a research scholar in cloud computing. A seasoned expert in developing IBM products and services, her insights shared here reflect her personal and independent views.
Reserve Your Spot
First Name*
Last Name*
Email Address*
Job Title*
Company*
Phone Number*
Country*