Executive Overview, Atmosec

Misha Seltzer
CTO & Co-Founder, Atmosec
Atmosec provides continuous SaaS Security with automatic monitoring, risk-assessment and protection of all connected services and the behavior between them
Executive Overview, Blue Hexagon

Nayeem Islam
CEO, Blue Hexagon
Nayeem and Richard Stiennon discuss Blue Hexagon's Continuous Cloud Threat Detection and Response Deep Learning platform
Executive Overview, Check Point

Tsion Gonen
VP, Check Point
Cloud native security with advanced threat prevention for all assets & workloads in public, private, hybrid or multi-cloud environments
Developer-First Cloud Security by Spectral

Idan Didi
Co-founder & COO
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets.
Cyber Wellness is The New Cybersecurity

Erkang Zheng
CEO & Founder, JupiterOne
Cloud-native security platform built on a graph data model, to expose the complex relationships between your cyber assets.
Obsidian Security Technical Demo

Mike Duong
Director of Solutions Engineering
Get an in-depth demonstration of Obsidian, the first comprehensive SaaS security platform. Find out how to easily connect your applications and learn about its advanced threat detection and posture management features.
Holistic Protection for AWS, Azure and Google Cloud with Ermetic

Garrett Bechler
Senior Director, Sales Engineering
Ermetic shows a cloud security platform that is revolutionizing the way people actually look at their security within the public cloud.
AI-Powered Cloud Workload Protection

Howie Howerton
Sr. Strategic Engineer, SentinelOne
Your hybrid cloud business is complex. Cloud workload protection shouldn't be. Automate detection and remediation of complex threats across Linux and Windows servers, Docker and Kubernetes, from the multi-cloud, multi-tenant Singularity Platform.
Executive Overview, Sonrai Security

Brendan Hannigan
CEO & Co-Founder, Sonrai Security
Cloud security for AWS, Azure, and Google Cloud via our cloud identity graph, combines CSPM, CIEM, CWPP, CNAPP, and data security
Understanding Identity in the Public Cloud

Sandy Bird
Co-Founder & CTO, Sonrai Security
Cloud security for AWS, Azure, and Google Cloud via our cloud identity graph, combines CSPM, CIEM, CWPP, CNAPP, and data security
Leading Container Security & Visibility with Sysdig

Dan Schwarz
Sr. Sales Engineer, Sysdig
Prioritize software vulnerabilities, detect and respond to threats and manage configurations, permissions and compliance
Valtix Executive Overview

Douglas Murray
CEO, Valtix
Protects workloads in AWS, Azure, GCP, & OCI with no agents or appliances, in multicloud environments---and is deployable in 5 minutes
Valtix for Cloud-Native Microsegmentation

John Clark
Head of Solutions
Valtix delivers comprehensive capability to define granular policies to enable least privilege access between (east-west) and to/from their workloads (north-south). Requires no agents or virtual appliances and deploys in minutes.
Securing Your SaaS Ecosystem with Atmosec

Aner Gelman
Co-founder and CEO, Atmosec
SaaS Security with automatic monitoring, risk-assessment and protection of all connected services and the behavior between them.
CloudGuard for Posture Management

Abigael Levy
Technical Product Manager
Automate governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.
CloudGuard for Posture Management

Yonatan Philip
Product Manager
Automate governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.
CloudGuard for Workload Protection

Alfred Trevino
TMM Check Point Software
CloudGuard provides the first fully automated, cloud-native workload security solution. It provides unified visibility, compliance and threat prevention across applications, APIs and microservices (K8s containers & serverless functions), from development through runtime.
Next-gen CSPM and CAASM with JupiterOne

Akash Ganapathi
Director Solutions, Architecture - JupiterOne
Singularity Cloud Workload Security to simplify security of cloud VMs and containers, no matter their location
Executive Overview, JupiterOne

Erkang Zheng
CEO & Founder, JupiterOne
Cloud-native security platform built on a graph data model, to expose the complex relationships between your cyber assets.
Obsidian Security Executive Overview

Ben Johnson
Co-founder & CTO
Discover Obsidian Security, the first and only comprehensive platform for SaaS security. Detect threats across applications while proactively hardening configurations and reducing excessive permissions to minimize enterprise risk.
Executive Overview, SentinelOne

Michael Leland
Chief Cybersecurity Evangelist
SentinelOne provides an autonomous cybersecurity platform that prevents threats at a faster speed, greater scale, and higher accuracy than humanly possible. Learn more at s1.ai/cws.
Runtime Protection for Containerized Workloads

Howie Howerton
Sr. Strategic Engineer, SentinelOne
Runtime protection is vital to identify and stop unknown threats that pre-production scans miss. Remove SOC blind spots with EDR and threat hunting into self-managed and managed Kubernetes like EKS, AKS, GKE.
CSPM Speaker Session

Sandy Bird
Co-Founder & CTO, Sonrai Security
Cloud security for AWS, Azure, and Google Cloud via our cloud identity graph, combines CSPM, CIEM, CWPP, CNAPP, and data security
Managing Cloud Risk without Slowing Application Delivery

Knox Anderson
VP, Product Management - Sysdig
Prioritize software vulnerabilities, detect and respond to threats and manage configurations, permissions and compliance
Kubernetes Security with Sysdig

Eric Magnus
Sales Engineering Manager, Sysdig
Prioritize software vulnerabilities, detect and respond to threats and manage configurations, permissions and compliance
Valtix for Cloud Workload Protection

John Clark
Head of Solutions
Address key use cases for intrusion prevention (IDS/IPS), block exploit attempts, gain visibility into malicious traffic, detect malware (AV), limit access, and perform incident response.