Securing Accelerated Transformation

Aggregating, Analyzing, and Modeling
Critical Enterprise Data

Friday, June 12th
@ 12:00 - 1:30 pm CST

Friday, June 12th
@ 12:00 - 1:30 pm CST

About the Program

Securing Accelerated Transformation: Aggregating, Analyzing, and Modeling Critical Enterprise Data is an invitation-only virtual event featuring an expert panel and open room discussion.

This event is limited to 30 information security architects, engineers, and leaders from major industries who will convene over three goals:

  • Learn from insightful conversations led by our moderated panel
  • Participate in interactive breakout room video discussions
  • Build meaningful new connections with a group of like-minded peers

About the Content

Enterprises at any stage of their digital transformation journey have seen COVID-19 accelerate the pace of change and add urgent projects to the initiative. New complications have been introduced along the way—abrupt shifts in security architectures and policies, rapid new tool adoption, heavy reliance on the cloud, and a remote workforce signing in from a surplus of new devices.

Enterprise teams employ an average of 57.1 security tools (Censuswide) to protect these siloed, complex and hybrid-cloud systems. The ability to aggregate, centralize and model these rich sets of data is critical to the success of accelerated transformation initiatives.

As such, security leaders need to make top priorities of gaining big-picture visibility and control over their increasingly complex internal workflows. Only with this perspective can they implement the clear, automated processes needed to find and close the growing number of vulnerabilities, minimize compliance risk and tighten overall security efficacy.

Discussion Topics

  • The importance of multi-source aggregation of data sets and contextual analysis for modeling across disparate network elements – including on-prem IT, OT, cloud and virtual networks
  • Maintaining control, compliance and visibility of an expanding attack surface, newly connected devices, and rapidly adopted cloud technologies
  • Employing analytics to find process disconnects and uncover blind spots
  • Using internal and external threat contexts in continuous vulnerability assessment
  • Identifying, finding, and connecting data points across the enterprise to allow efficient prioritization of threats


Peter Margaris
Senior Director, Product Marketing
Skybox Security


Chris Carter
Global Head of Security Analytics
Zurich Insurance Company
Arun DeSouza
Chief Information Security & Privacy Officer (CISO)
Nexteer Automotive

Event Details


Friday, June 12th, 2020


12:00 pm – 1:30 pm CST

Attendee Profile

30 information security architects, engineers, and leaders


12:00PM     Attendees Enter Virtual Event & Welcome Remarks

12:05PM     Video Networking in Breakout Rooms

12:15PM     Panel Discussion

12:55PM     Audience Q&A

1:10PM       Breakout Networking Sessions


Attendees Enter Virtual Event & Welcome Remarks


Video Networking in Breakout Rooms


Panel Discussion


Audience Q&A


Breakout Networking Sessions


At Skybox Security, we provide you with cybersecurity management solutions to help your business innovate rapidly and with confidence. We get to the root of cybersecurity issues, giving you better visibility, context and automation across a variety of use cases. By integrating data, delivering new insights and unifying processes, you’re able to control security without restricting business agility. Skybox’s comprehensive solution unites different security perspectives into the big picture, minimizes risk and empowers security programs to move to the next level. With obstacles and complexities removed, you can stay informed, work smarter and drive your business forward, faster. For more information, visit



Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch.

The Adobe family of companies would like to keep you informed with personalized emails about products and services. See our Privacy Policy for more details.

Please contact me via email.

By clicking “Submit” I agree that I have read and accepted the Terms of Use.
Adobe Privacy Center
Adobe Privacy Policy
Adobe marketing and advertising practices I Adobe
Adobe marketing and advertising practices
Adobe Privacy Center
Adobe Privacy Policy
Legal Terms of Use for Adobe products & services