July 17, 2018


The changing digital landscape of data and devices is creating a perfect storm of opportunity for cybercriminals. Enterprises today are prime targets, as more users access more data using more—and more varied—devices. In particular, enterprises today must contend with issues including ransomware, IoT security flaws, DDoS attacks and managing mobile devices on the corporate network.

In this webinar, we’ll take a look at the four current threats enterprises can’t ignore in maintaining a strong security posture and offer tips in alleviating the complexity of and frustration in addressing each threat. Our panel of industry experts also will provide some best practices in preparing now for the next generation of security threats.

 Jeannie Warner

Jeannie Warner, Security Manager, 
WhiteHat Security

Jeannie has worked in security since 2001, with detailed work in analysis and operations, product management, product marketing, senior operations management, and occasional forensics investigation and compliance. She is an advocate and evangelist for security process maturity, and finding integration points for application and network security as the “big picture” in managing risk.



benjamin sherman

Benjamin Sherman, 
Solutions Engineer,

Dr. Sherman is an internationally recognized author, expert, and trusted adviser in the fields of data, networking, security, identity and compliance. Ben has built engineering and consulting teams in both private and non-governmental contexts. Ben’s role within OneLogin is to help Fortune 100 organizations transform their security and access postures with disruptive technologies that re-balance the trade-off between greater security and ease-of-access.


Brandon Creighton, Research Architect, Veracode

Brandon Creighton is a Research Architect at Veracode. In this role, he’s working to make application security testing more accurate, scalable and effective. He also works with DevOps and security teams – both at Veracode and customer organizations -- to help them maximize the value gained from using application security testing services and tools. He has presented research on application, device and wireless security at conferences such as Black Hat, CanSecWest and Shmoocon. 


scott king_square (1)

Scott King (CISSP) - Sr. Director - Rapid7 Consulting

Scott has over 20 years of professional work experience in the IT and cybersecurity fields. He started his career as a network and systems engineer in the midst of the Silicon Valley dot com boom of the 90's. In 2001, Scott moved into an information assurance role supporting the Department of Defense, which kick started his career as a cybersecurity professional. Scott has worked for the DoD, state governments, large technology companies, mid-size manufacturing companies, and the spent significant time in the energy industry. Scott brings a unique mixture of hands-on experience in incident response, penetration testing, forensics, operations, architecture, engineering, and executive leadership as a former Chief Information Security Officer (CISO) to the Rapid7 Advisory team.