On Demand Sessions

Learn from the best:
Proactively validate your security and mitigate the gaps before a breach happens

Gaining valuable insights from security experts, we have learned about the new cloud platform and how it strengthens organizations’ cyber resilience by making real-world threat simulation easier and more accessible.



Opening from CEO: Why businesses get breached despite all efforts
H. Alper Memiş, Co-founder&CEO, Picus Security

Alper Hamdi Memiş

Why the investments you make don't actually provide more security? We are here to talk about why organizations should adapt a threat-centric approach in an automated and continuous manner  to scale their cyber defense capabilities. 


Keynote: Outlook for Security Operations going into 2023
Al Price, Senior Analyst, Gartner 

Al Price

As security operations undergo a transformation in when and how security is planned and delivered, organisations face important questions: Do we really need to centralise data for security? Is there a single solution to solve all of my security needs? How do we determine what is threat intelligence for us?  How should Threat Hunting be handled? This exclusive virtual session seeks to provide answers by exploring the technologies, processes and services that will have the biggest impact on how security operations are delivered in 2022 and beyond.

CTO's Message: How Complete Security Validation can be the game changer for your business?
Volkan Ertürk, Co-founder&CTO, Picus Security

Volkan Ertürk

The security validation concept has been adopted by security operations and compliance frameworks, yet many organizations still struggle to adopt it. In this session, learn the shortcomings of point solutions and how the future of security validation will be the game changer for your business.

Panel: Security validation has many use cases. Which ones matter to you?
Erik Van Buggenhout, Author and Sans Instructor, NVISO
Swetha Krishnamoorthi, Senior Industry Analyst, Frost&Sullivan
Silvan Tschopp, VP of Product Marketing, Picus Security

Swetha Krishnamoorthi
Erik Van Buggenhout
Silvan Tschopp

Listen to the two experts, Swetha Krishnamoorthi from Frost&Sullivan and Erik Van Buggenhout, Co-founder of NVISO and lead instructor at SANS, as they discuss the rising need of automated security validation and the specific examples of how security teams can improve their cyber resilience.

Assume Breach: What does this mean for your most critical assets?
Leverage Attack Path Validation to Deal with Growing Cyber Risks

Gürsel Arıcı, Director of Solution Architects, Picus Security
Simon Monahan, Product Marketing Leader, Picus Security 

Gürsel Arıcı
Simon Monahan

With cyber security breaches now an operational reality, it’s essential to plan for the worst. Join this session to learn about the benefits of an assume breach mindset and how to minimize the impact of intrusions by discovering the paths attackers could take to compromise your systems and users.

How does SCV contribute to Risk Management & Resilience
Urooj Burney, Senior Principal & Global Head Risk & Resilience Practice, Mastercard
Hakan Terzioğlu, VP of Corporate Growth, Picus Security

Urooj Burney
Hakan Terzioğlu

On this session, Urooj Burney, Global Practice Head from Mastercard will answer Hakan Terzioğlu’s questions, elaborating the purpose and value behind Mastercard and Picus’ strategic partnership in the cyberspace and shed some light on how SCV contributes to Risk Management & Resilience with real life examples.

Supercharge Your SOC: Optimize your detection and response capabilities by
continuously validating your detection rule base
Gaye Güven, Product Marketing Technology Alliances Program Manager, Picus Security
Simon Hüber, Senior Sales Engineer, Picus Security

Gaye Güven
Simon Hüber

SIEM and EDR tools provide an important layer of defense against advanced threats. However, security leaders often struggle to measure the effectiveness of these tools and recruit the experts required to maximize the protection they provide. This session will cover how the Picus Detection Rule Validation solution enables you to continuously validate the effectiveness of your SIEM and EDR solutions as well as significantly reduce the cost and complexity of managing it.

Improve your cyber resilience with proactive security validation
Silvan Tschopp, VP of Product Marketing, Picus Security

Silvan Tschopp

In this closing session, we’ll recap why it is essential for every organization to become more effective in their security operations and how automated security validation can support them in proactively improving their cyber resilience.