Hear from Hexnode's board of directors as they share their vision for Hexnode's future. Learn more about Hexnode's product updates and exciting announcements.
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. At HexCon22, Brian tells the tale of two million interrogated devices.
Join Ciaran Martin and Apu Pavithran, CEO, Hexnode, as they engage in an interesting conversation on everything cybersecurity.
Join Randy Varela as he dives into vulnerability management, why it is still a problem and how it can be tackled.
iOS management just got easier with Hexnode. Catch up on the latest updates in this comprehensive training session.
The UEM market is projected to reach $53.65 billion by 2030. Andrew Hewitt, Senior Analyst at Forrester, and Rachana Vijayan, CMO, Hexnode, sit down to discuss the future of UEM.
Veteran Microsoft Trainer Abhilasha Rakesh discusses the importance of information protection and governance, configuring DLP policies and how to prevent data losses.
Remember the scary 'solorigate' attack that demonstrated the easiness with which attackers could hack into well-protected firms? Top cybersecurity expert Roman Zhukov talks about the best practices to take care of when reusing both open-source and close-source products by the development and infrastructure team and how to mitigate potential threats.
The financial impacts of ransomware attacks are immense, and they can jeopardize businesses of any size, and the extortion economy, unfortunately, is booming. Check out this engaging session by cybersecurity thought leader Walt Powell to learn more.
Learn about Mac management with Hexnode, in this brief session.
Zero-trust concepts are rapidly shaping cloud environments, and Atef Abdelkefi takes a closer look at zero-trust in the cloud.
Cybersecurity ambassador Jacob Luna talks about improving a workforce's resilience in line with an improved cybersecurity framework.
Philip Ingram, an established journalist with a long-standing career in the British Military Intelligence dives into how mobile devices and apps are the new endpoint threat.
90 percent of data breaches are initiated through human hacking. Former CIA Analyst Peter Warmka explores the methodologies utilized by threat actors to manipulate people.
Danny Bader, shares the story of his own near-death experience and offers the audience the opportunity to strengthen their approach to living life
Simplify Android device management, with Hexnode, in this detailed training session.
MFA’s are quite hackable. But there are types of MFAs that are more phishing resistant and less hackable. Roger Grimes, Data-Driven Evangelist at KnowBe4, talks about the “Hacks that bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant.”
It’s said that for every lock, there is someone out there trying to pick it or break in. The cybersecurity domain is no different. Rick Holland, CISO & Vice President of Strategy at Digital Shadows talks about how ‘Cybercrime finds a way.’
Worried about how a data breach would affect your wallets? Ashwin Ram offers his insights on key focus areas for reducing the cost of a data breach.
Many organizations have security programs but do not have security strategies. Warner Moore, the founder of Gamma Force, talks about the importance of building a strategic security program and how to drive a strategy that enables your organization
When someone mentions cloud security, you think of Infrastructure as a Service. Jerich's session might change your mind about it, as he discusses SaaS's relevance in cloud security.
Windows management simplified, with Hexnode. Discover the latest features and updates, in this brief training session.
If leaders adopt the right strategies, businesses can improve the productivity levels of remote teams. Stacy Thayer, Adjunct Professor of Cyberpsychology at Norfolk State University, has helpful tips for the security leaders among us on effective management of remote teams.
Marcos Sêmola speaks On the rapidly growing cybersecurity threats and how we could work to unlock the leadership mindset to prioritize investment in cybersecurity properly.
Get insights into Nick Shevelyov’s book ‘Cyber War and Peace,’ in which he takes lessons from history and translates them through analogical storytelling into security practices.
The proliferation of IoT devices has truly revolutionized various sectors, but it poses significant security hazards. Join Sunil David as he dwells deeper into IOT's challenges and best practices.
Sergey Chubarov, Trainer at Microsoft, speaks about Microsoft Defender for Office 365, the vulnerabilities, and how protections may be bypassed. If you work with Microsoft, this is a must-watch session!
In the corporate world, it isn’t uncommon to see managers frustrated from missed deadlines or staff close to burnout from understaffed teams. Best-selling author Dr. Sha Yanna speaks about how misunderstandings drain ROI.
Browser Isolation secures a computer/network from web-based threats by executing all browsing activity in an isolated virtual environment. Cybersecurity Architect Evgeniy Kharam guides how browser isolation helps secure the network and how it helps achieve zero trust network access and more.
Do you downplay the importance of cybersecurity and underestimate associated risks? You might be forced to rethink by the end of this session by Jennifer Cox.
This session by an Air Force Veteran with a myriad of experience within IT, and cybersecurity, sheds light on the active role in ensuring the provision of necessary tools and opportunities for the next generation to develop a strong and resilient cyber team.
Cybersecurity Executive Chuck Davis, vCISO at Caveat Labs speaks on the topic ‘Patch Overflow: How to Manage the Deluge of Vulnerabilities.’ in this HexCon22 session.
Don’t miss this session on “Built for Business and Rugged Device Management,” to understand the relevance of rugged device management from the leaders at Cat Phones.
By 2025, the global datasphere will reach 175 zettabytes- that's the number 175 followed by 21 zeroes. How do you intend to secure this huge lot of data? Do the growing numbers of cybercrime seem threatening? Watch Joe Tidy from BBC News answer these questions, in an interview session with Sarika Abraham, Media and Public Relations Manager.
Do you find networking hard? Join Aarti Gadhia, one of the top 20 women in cybersecurity Canada, at HexCon22 as she offers networking tips to fuel your growth while staying authentic.
Cyber-attacks on critical infrastructure have an enervating impact on public health, safety, commerce, and even national security. Tune into Ali Kingston Mwila’s session that focuses on the immediate approach to explore and outline forms of cyber-attack capabilities.
The theft of IP assets comes with enormous monetary losses and significant reputational damage. Frank Figgliuizzi, former FBI Assistant Director for Counterintelligence, throws light on the importance of safeguarding intellectual property.
Mike Saylor, a technology professional with vast experience, analyses cyber incidents at two large organizations and gives recommendations for being more effective in our incident response capabilities.
Information Security advocate, Jeff Man, shares his experiences of over 40 years on what used to be known as information security and is now referred to as cybersecurity. But are they the same, or are they different?
Kim Kennedy breaks down the myths of barriers to entry and elaborates on our role as practitioners to raise awareness in a way everyone can understand.
Businesses need to discover and lock down privileged access since cyber-attacks involve exploiting privileged credentials. Are you ready to protect the keys of the kingdom? David Muniz will guide you to safety.
US Air Force veteran and CEO of Digital Beachhead, Mike Crandall talks about the myth of cybersecurity compliance.
Tech leader Tina Gravel elaborates on practical ideas around what can be done to protect public or private firms by implementing Zero Trust's aspects.
Are we safe online? Ben Owen, an intelligence collection professional with over 20 years in the industry explores more on online safety.
Isn’t it alarming that one may be influenced to divulge confidential information by psychological exploitation? Victoria Granovia’s session on psychology and social engineering dive deep into an immensely relevant issue with grave implications.
Embracing openness and interoperability is the way forward as businesses are looking forward to establishing digital trust and improving cybersecurity. Industry analyst, David Mahdi, shares his knowledge in the domain.
The path towards a data-centric world is crucial, in today's environment. Dr. Char Sample engages in a conversation about data fidelity, its evolution, and the importance of being secure in a data-centric world.
Fostering communities of like-minded security enthusiasts from across the globe helps in sharing info on potential attacks and essential remedies. Learn more from the community lead of Diary of Hackers, Joshua Moses.
The pandemic has brought to the fore weaknesses that companies have always had regarding onboarding new employees. What if I hire an impostor, who can later be properly authenticated following all my security controls? Learn more about this riveting session by Manuel Garat Loureiro.
Integrating security in the 'software development lifecycle' safeguards enterprises from cyberattacks. Join the trio of Sam Sehgal, Chris Kirchsce, and Kapil Bareja with Amith Manoj to learn more on DevSecOps.