Securing Accelerated Transformation

Aggregating, Analyzing, and Modeling
Critical Enterprise Data

Thursday, June 11th
@ 11am PST / 1pm CST

Thursday, June 11th
@ 11am PST / 1pm CST

About the Program

Securing Accelerated Transformation: Aggregating, Analyzing, and Modeling Critical Enterprise Data is an invitation-only virtual event featuring an expert panel and open room discussion.

This event is limited to 30 information security architects, engineers, and leaders from major industries who will convene over three goals:

  • Learn from insightful conversations led by our moderated panel
  • Participate in interactive breakout room video discussions
  • Build meaningful new connections with a group of like-minded peers

About the Content

Enterprises at any stage of their digital transformation journey have seen COVID-19 accelerate the pace of change and add urgent projects to the initiative. New complications have been introduced along the way—abrupt shifts in security architectures and policies, rapid new tool adoption, heavy reliance on the cloud, and a remote workforce signing in from a surplus of new devices.

Enterprise teams employ an average of 57.1 security tools (Censuswide) to protect these siloed, complex and hybrid-cloud systems. The ability to aggregate, centralize and model these rich sets of data is critical to the success of accelerated transformation initiatives.

As such, security leaders need to make top priorities of gaining big-picture visibility and control over their increasingly complex internal workflows. Only with this perspective can they implement the clear, automated processes needed to find and close the growing number of vulnerabilities, minimize compliance risk and tighten overall security efficacy.

Discussion Topics

  • The importance of multi-source aggregation of data sets and contextual analysis for modeling across disparate network elements – including on-prem IT, OT, cloud and virtual networks
  • Maintaining control, compliance and visibility of an expanding attack surface, newly connected devices, and rapidly adopted cloud technologies
  • Employing analytics to find process disconnects and uncover blind spots
  • Using internal and external threat contexts in continuous vulnerability assessment
  • Identifying, finding, and connecting data points across the enterprise to allow efficient prioritization of threats


Peter Margaris
Senior Director, Product Marketing
Skybox Security


Paul Brager
Director, Global OT Security Programs
Baker Hughes
Boyan Vukichevich
Director, Application Development
J.B. Poindexter & Co., Inc.

Event Details


Thursday, June 11th, 2020


11am PST / 1pm CST

Attendee Profile

30 information security architects, engineers, and leaders


11:00AM     Attendees Enter Virtual Event & Welcome Remarks

11:05AM     Video Networking in Breakout Rooms

11:15AM     Panel Discussion

11:55AM     Audience Q&A

12:10PM     Breakout Networking Sessions


Attendees Enter Virtual Event

& Welcome Remarks


Video Networking in Breakout Rooms


Panel Discussion


Audience Q&A


Breakout Networking Sessions


At Skybox Security, we provide you with cybersecurity management solutions to help your business innovate rapidly and with confidence. We get to the root of cybersecurity issues, giving you better visibility, context and automation across a variety of use cases. By integrating data, delivering new insights and unifying processes, you’re able to control security without restricting business agility. Skybox’s comprehensive solution unites different security perspectives into the big picture, minimizes risk and empowers security programs to move to the next level. With obstacles and complexities removed, you can stay informed, work smarter and drive your business forward, faster. For more information, visit



Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.
Adobe Privacy Center
Adobe Privacy Policy
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices
Adobe Privacy Center
Adobe Privacy Policy
Legal Terms of Use for Adobe products & services