Join us on September 25th to hear from Cybersecurity veterans and luminaries on how you can stand up against sophisticated cyber threats, and bounce back faster in the event of an attack.
With the growing volume and sophistication of today’s threats, it’s critical for IT and security ... Show more
Data security used to mean technologies like data encryption, data masking, and data loss prevent... Show more
As the threat landscape shifts and IT infrastructures transform, the role of the CISO continues t... Show more
It’s no secret that AI, ML, and LLMs are all the rage. These powerful tools bring great opportuni... Show more
Today's threat actors are relentless in their pursuit of your data, evolving their attack tactics... Show more
When it comes to data security, what are the roles of the CIO and CISO? Given a choice between in... Show more
According to research from Rubrik Zero Labs, organizations will store an average of 1231.8 teraby... Show more
In our closing session, Cybersecurity Journalist & Author Nicole Perlroth will dive into the stor... Show more
With the growing volume and sophistication of today’s threats, it’s critical for IT and security ... Show more
Data security used to mean technologies like data encryption, data masking, and data loss prevent... Show more
As the threat landscape shifts and IT infrastructures transform, the role of the CISO continues t... Show more
It’s no secret that AI, ML, and LLMs are all the rage. These powerful tools bring great opportuni... Show more
Today's threat actors are relentless in their pursuit of your data, evolving their attack tactics... Show more
When it comes to data security, what are the roles of the CIO and CISO? Given a choice between in... Show more
According to research from Rubrik Zero Labs, organizations will store an average of 1231.8 teraby... Show more
In our closing session, Cybersecurity Journalist & Author Nicole Perlroth will dive into the stor... Show more
With the growing volume and sophistication of today’s threats, it’s critical for IT and security ... Show more
Data security used to mean technologies like data encryption, data masking, and data loss prevent... Show more
As the threat landscape shifts and IT infrastructures transform, the role of the CISO continues t... Show more
It’s no secret that AI, ML, and LLMs are all the rage. These powerful tools bring great opportuni... Show more
Today's threat actors are relentless in their pursuit of your data, evolving their attack tactics... Show more
When it comes to data security, what are the roles of the CIO and CISO? Given a choice between in... Show more
According to research from Rubrik Zero Labs, organizations will store an average of 1231.8 teraby... Show more
In our closing session, Cybersecurity Journalist & Author Nicole Perlroth will dive into the stor... Show more
With the growing volume and sophistication of today’s threats, it’s critical for IT and security ... Show more
Data security used to mean technologies like data encryption, data masking, and data loss prevent... Show more
As the threat landscape shifts and IT infrastructures transform, the role of the CISO continues t... Show more
It’s no secret that AI, ML, and LLMs are all the rage. These powerful tools bring great opportuni... Show more
Today's threat actors are relentless in their pursuit of your data, evolving their attack tactics... Show more
When it comes to data security, what are the roles of the CIO and CISO? Given a choice between in... Show more
According to research from Rubrik Zero Labs, organizations will store an average of 1231.8 teraby... Show more
In our closing session, Cybersecurity Journalist & Author Nicole Perlroth will dive into the stor... Show more
Dana Kilcrease is the Chief Information Security Officer at Berkeley College. With a career spanning 14 years at the college, he has held various technical and leadership roles, including software and security engineering positions.
In his current role as CISO, Dana leads the college's security programs and projects, shaping their strategic direction and implementation. Reporting to the Chief Information Officer, his work focuses on protecting the college's information systems and ensuring the security of student, staff, and faculty data.
Dana is dedicated to building a strong culture of security awareness at Berkeley College. His efforts have helped Berkeley College stay prepared for the challenges of today's cyber landscape, ensuring that everyone on campus understands the importance of data protection and how to contribute to the collective security of the college.
Regional broadcasts will take place starting at the following times:
To attend, simply complete your registration and add the event to your calendar. All calendar holds will have a link to join the event embedded in them. You will also receive an email 24 hours and 30 minutes prior to the event with links to join.
There is no cost to attend Data Security Summit.
By joining this virtual event, you’ll also be eligible for 2 CPE credits (1 per hour watched) through (ISC)^2.
Following the event, you can submit your credits through the (ISC)^2 member dashboard, with the course name of Rubrik Data Security Summit. Your attendee email will qualify as proof of attendance.
Yes, all sessions from Data Security Summit will be available to registered attendees to view on demand after the regional broadcasts have ended.