Speakers

Sort by
Newest
Trending
1-30 of 35
Filter
Oisin Lunny
Co-founder at Galaxy of OM, S.L.
access to information, accessibility, amazon (company), amazon web services, analytics, assistive technology, authentication, automation, best practice, bit, business, business model, chatbot, chief risk officer, cloud computing, cloud computing security, coal, collaboration, community, competence (human resources), computer network, computer security, computing, corporates, credit card, credit history, cryptocurrency, customer relationship management, customs, cybersecurity, data, data breach, data center, data security, database, database transaction, decision-making, derivative (finance), digital identity, digital transformation, digital wallet, disaster recovery, diversity, ecological resilience, educational technology, email, empathy, engineering, enterprise risk management, evidence-based medicine, evidence-based practice, facebook, financial crisis, financial technology, financialinclusion, google, governance, great depression, information security, infrastructure as code, innovation, internet, intrusion detection system, investment banking, learning analytics, machine learning, managed security service, market (economics), market liquidity, mentorship, mind, mobile phone, money laundering, multi-factor authentication, one-time password, paris agreement, penetration test, privacy, productivity, racial inequality in the united states, reality, recruitment, regulatory compliance, regulatory technology, risk management, roaming, scalability, scientific method, sim card, sim swap scam, smartphone, social equality, social exclusion, social media, social responsibility, software , software development, startup company, strategic management, subscription business model, sustainability, sustainable development, telecommuting, threat (computer), trading room, trust (social science), uber, vulnerability (computing), wildfire
Dario Betti
Chief Executive Officer at Mobile Ecosystem Forum
authentication, credit card, credit history, customer relationship management, customs, database, digital identity, digital transformation, digital wallet, ecological resilience, email, facebook, google, internet, mobile phone, multi-factor authentication, one-time password, roaming, sim card, sim swap scam, smartphone, social media, subscription business model, uber
Mark Page
VP Sales and Purchasing at TMT Analysis
authentication, credit card, credit history, customer relationship management, customs, database, digital identity, digital transformation, digital wallet, ecological resilience, email, facebook, google, internet, mobile phone, multi-factor authentication, one-time password, roaming, sim card, sim swap scam, smartphone, social media, subscription business model, uber
Eve Kilel
Cyber Security Engineer at Safaricom PLC and Co-Founder at Shehacks_KE
automated teller machine, blockchain, computer security, conversation, cyberattack, cybercrime, education, expert, identity theft, information and communications technology, information sensitivity, innovation, m-pesa, mentorship, mobile security, one-time password, personal data, personal identification number, phishing, research, sim card, social engineering (security), telecommunication, vulnerability (computing), web application
Laura Tich
Founder at SheHacks_KE
automated teller machine, blockchain, computer security, conversation, cyberattack, cybercrime, education, expert, identity theft, information and communications technology, information sensitivity, innovation, m-pesa, mentorship, mobile security, one-time password, personal data, personal identification number, phishing, research, sim card, social engineering (security), telecommunication, vulnerability (computing), web application
Frank Bunger
Senior Product Manager at Citrix
anonymizer, apple inc., application firewall, authentication, business, citrix synergy 2019, cloud, collaboration, communication protocol, cross-site scripting, denial-of-service attack, domain name system, enterprise, firewall (computing), have i been pwned?, http strict transport security, internet, internet protocol, lightweight directory access protocol, man-in-the-middle attack, mobility, multi-factor authentication, netscaler, networking, one-time password, password, penetration test, social engineering (security), software , technology, throughput, tor (anonymity network), transport layer security, virtualization, vulnerability (computing)
Praveen Raghuraman
Director, Product Management at Citrix
access control, analytics, android (operating system), apple inc., authenticator, blacklist (computing), browser isolation, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, command-line interface, computer network, content-control software, desktop virtualization, dynamic host configuration protocol, enterprise, facebook, firefox, google chrome, http cookie, information security, instagram, internet, internet explorer, ios, keystroke logging, malware, mobility, multi-factor authentication, networking, office 365, one-time password, password, privacy, proxy server, remote desktop protocol, rsa securid, single sign-on, social media, software , spamming, steam (service), technology, url redirection, virtualization, web browser, web portal, website, world wide web
Pete Downing
Chief Marketing Technology Officer (CMTO) at XenTegra
access control, android (operating system), apple inc., authenticator, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, desktop virtualization, enterprise, firefox, google chrome, information security, internet explorer, ios, keystroke logging, malware, mobility, multi-factor authentication, networking, office 365, one-time password, password, proxy server, remote desktop protocol, rsa securid, single sign-on, software , spamming, steam (service), technology, virtualization, web portal
Srinivasan Shanmugam
Enterprise System Engineer at Prime Healthcare
access control, android (operating system), apple inc., authenticator, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, desktop virtualization, enterprise, firefox, google chrome, information security, internet explorer, ios, keystroke logging, malware, mobility, multi-factor authentication, networking, office 365, one-time password, password, proxy server, remote desktop protocol, rsa securid, single sign-on, software , spamming, steam (service), technology, virtualization, web portal
Patrick Coble
Principal Consultant at VDISEC
active directory, ad blocking, anonymizer, apple inc., application firewall, authentication, business, citrix synergy 2019, cloud, collaboration, command-line interface, communication protocol, cross-site scripting, denial-of-service attack, desktop virtualization, domain name system, enterprise, facebook, file explorer, file system, firewall (computing), have i been pwned?, http strict transport security, internet, internet protocol, ipsec, lightweight directory access protocol, linkedin, malware, man-in-the-middle attack, mobility, multi-factor authentication, netscaler, networking, ntfs, one-time password, password, penetration test, powershell, proxy server, public key certificate, ransomware, shortcut (computing), social engineering (security), social networking service, software , start menu, technology, throughput, tor (anonymity network), transport layer security, virtual private network, virtualization, vulnerability (computing), wi-fi protected access, windows registry
Martin Zugec
Senior Architect - Technical Marketing at Citrix
active directory, analytics, app store (ios), authentication, authenticator, authorization, automation, best practice, big data, biometrics, botnet, brute-force attack, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer security, dark web, desktop virtualization, email, end user, enterprise, exploit (computer security), facebook, gmail, google account, google chrome, google voice, group policy, internet of things, legacy system, login, machine learning, man-in-the-middle attack, mentorship, microsoft windows, mobile app, mobile phone, mobility, multi-factor authentication, nap, networking, ntfs, one-time password, operating system, password, plug-in (computing), powershell, qr code, replay attack, risk, risk assessment, secure communication, security token, shell (computing), sim card, single sign-on, social media, software , start menu, taskbar, technology, the avengers (2012 film), thin client, time-based one-time password algorithm, understanding, universal windows platform, universal windows platform apps, user (computing), virtualization, windows 10, windows 7, windows xp, workspace
Oscar Day
Product Manager at Citrix
active directory, authenticator, business, citrix cloud, citrix synergy 2019, citrix systems, cloud, collaboration, email, enterprise, google authenticator, identity document, internet, login, mobility, multi-factor authentication, net neutrality, netscaler, networking, one-time password, password, passwordless authentication, qr code, sharefile, sharepoint, single sign-on, software , symantec, technology, time-based one-time password algorithm, virtualization, web portal, workspace
Ricardo Feijoo
Distinguished Engineer at Citrix
active directory, authenticator, business, citrix cloud, citrix synergy 2019, citrix systems, cloud, collaboration, email, enterprise, google authenticator, identity document, internet, login, mobility, multi-factor authentication, net neutrality, netscaler, networking, one-time password, password, passwordless authentication, qr code, sharefile, sharepoint, single sign-on, software , symantec, technology, time-based one-time password algorithm, virtualization, web portal, workspace
Jonathan Federico
Senior Product Marketing Manager at Microsoft
android (operating system), authentication, authenticator, business, citrix synergy 2019, cloud, collaboration, computer network, digital subscriber line, dropbox (service), enterprise, health insurance portability and accountability act, internet, internet access, medicare (united states), mobile device management, mobility, netscaler, networking, office 365, onboarding, one-time password, onedrive, password, security token, shared resource, sharefile, single sign-on, skype, software , technology, thin client, unified communications, virtualization
Chris Hoffner
Passionate, Innovative, Transformation Driven Technology Leader at Facility Control Systems
android (operating system), authentication, authenticator, business, citrix synergy 2019, cloud, collaboration, computer network, digital subscriber line, dropbox (service), enterprise, health insurance portability and accountability act, internet, internet access, medicare (united states), mobile device management, mobility, netscaler, networking, office 365, onboarding, one-time password, onedrive, password, security token, shared resource, sharefile, single sign-on, skype, software , technology, thin client, unified communications, virtualization
Matt Crawford
Director, Product Marketing at Citrix
android (operating system), authentication, authenticator, business, citrix synergy 2019, cloud, collaboration, computer network, digital subscriber line, dropbox (service), enterprise, health insurance portability and accountability act, internet, internet access, medicare (united states), mobile device management, mobility, netscaler, networking, office 365, onboarding, one-time password, onedrive, password, security token, shared resource, sharefile, single sign-on, skype, software , technology, thin client, unified communications, virtualization
Jacob Rutski
Sr. Architect at Citrix
android (operating system), application software, authentication, authenticator, brick and mortar, business, citrix synergy 2019, citrix systems, citrix virtual apps, citrix workspace, cloud, cloud computing, collaboration, computer file, computer keyboard, computer network, coopervision, database, desktop virtualization, digital subscriber line, dropbox (service), enterprise, health insurance portability and accountability act, internet, internet access, inventory, load balancing (computing), login, medicare (united states), microsoft windows, mobile app, mobile device, mobile device management, mobility, netscaler, networking, office 365, onboarding, one-time password, onedrive, password, personal computer, security token, shared resource, sharefile, single sign-on, skype, software , spreadsheet, technology, thin client, unified communications, virtualization, vmware, web browser, windows server 2003, windows xp, workspace
Daniel Feller
Lead Workspace Architect at Citrix
active directory, android (operating system), authentication, authenticator, authorization, biometrics, bluetooth, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, dropbox (service), email, end user, enterprise, facebook, firefox, firewall (computing), gmail, google account, google chrome, google drive, google play, google voice, ios, ios jailbreaking, itunes, man-in-the-middle attack, mobility, multi-factor authentication, networking, office 365, one-time password, onedrive, operating system, password, phishing, qr code, replay attack, security token, single sign-on, social media, software , tablet computer, technology, time-based one-time password algorithm, transport layer security, url redirection, user (computing), virtualization, windows 10, workspace, world wide web
Jose Augustin
Senior Product Manager at Citrix
analytics, authenticator, business, chromebook, citrix synergy 2019, citrix systems, citrix workspace, cloud, collaboration, data scraping, enterprise, google authenticator, google play, hyper-v, hypervisor, malware, microsoft azure, microsoft windows, mobility, multi-factor authentication, networking, one-time password, operating system, password, provisioning (telecommunications), scrolling, software , technology, virtual machine, virtualization, vmware, web browser, windows 10, world wide web
Adam Lotz
Principal Product Marketing Manager, Virtual Apps and Desktops at Citrix
analytics, authenticator, business, chromebook, citrix synergy 2019, citrix systems, citrix workspace, cloud, collaboration, data scraping, enterprise, google authenticator, google play, hyper-v, hypervisor, malware, microsoft azure, microsoft windows, mobility, multi-factor authentication, networking, one-time password, operating system, password, provisioning (telecommunications), scrolling, software , technology, virtual machine, virtualization, vmware, web browser, windows 10, world wide web
Akhilesh Dhawan
Director of Product Marketing at Citrix
access control, android (operating system), apple inc., authenticator, botnet, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, desktop virtualization, end user, enterprise, firefox, gmail, google chrome, home network, information security, internet explorer, internet of things, ios, keystroke logging, load balancing (computing), malware, man-in-the-middle attack, mobility, multi-factor authentication, networking, office 365, one-time password, operating system, password, proxy server, public key certificate, remote desktop protocol, remote desktop services, rsa securid, single sign-on, socks, software , spamming, spyware, steam (service), technology, virtual private network, virtualization, web browser, web portal
Vipin Borkar
Sr. Director of Product Management at Citrix
android (operating system), bring your own device, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer security, data loss prevention software, device driver, email, enterprise, google drive, internet of things, keystroke logging, malware, microsoft, microsoft azure, microsoft powerpoint, mobile app, mobility, multi-factor authentication, networking, office 365, one-time password, onedrive, password, personal computer, phishing, screenshot, software , technology, virtual desktop, virtualization
Arvind Sankarasubramanian
Senior Product Manager at Citrix
android (operating system), bring your own device, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer security, data loss prevention software, device driver, email, enterprise, google drive, internet of things, keystroke logging, malware, microsoft, microsoft azure, microsoft powerpoint, mobile app, mobility, multi-factor authentication, networking, office 365, one-time password, onedrive, password, personal computer, phishing, screenshot, software , technology, virtual desktop, virtualization
Taylor Backman
Evangelist at Zoho
adobe creative cloud, adobe inc., adobe photoshop, amazon (company), analytics, apple maps, application software, attention, austin, behavior, boarding pass, brand, business software, chatbot, cloud, cloud application, cloud computing, collaboration, computer file, concept, consumer behaviour, consumerization, conversation, credit card, crm, culture, customer lifetime value, customer relationship management, dashboard (business), database, design, desktop computer, drag and drop, electronic mailing list, email, email marketing, email spam, emoji, experiment, facebook, facetime, faith, fee, flat rate, gmail, goal, goodwill (accounting), idea, imessage, language, laptop, legacy system, logic, macintosh, mail, marketing strategy, music, net promoter, nothing, office open xml, onboarding, one-time password, option (finance), outsourcing, password, pdf, personal computer, pricing, productivity, question, reality, reason, recruitment, research and development, résumé, sales, small business, software , software as a service, spamming, sql, stack (abstract data type), subscription business model, tag (metadata), technology, the matrix, the new york times, videotelephony, yelp, zoho, zohocorp, zoholics, zoholics 2019, zoholics austin
Laszlo Csercsa
VP Sales EMEA at SmartDisplayer Technology Co., Ltd.
access control, apple pay, authentication, biometrics, bluetooth, credit card, cryptocurrency, fee, financial transaction, form factor (mobile phones), innovation, mastercard, mobile app, mobile banking, mobile phone, one-time password, online banking, overdraft, radio-frequency identification, samsung pay, security token, shift money, shift money 2019, smartphone, sms, visa inc., wire transfer
Joel McKelvey
Director of Product Marketing at Looker
analytics, authentication, big data and consumer behavior, contract, credit card, data consumption trends, data delivery transformation, data usage trends, financial transaction, future, information, joel mckelvey, join 2019, join 2019 sessions, link analysis, looker conference, looker conference 2019, machine learning, mobile app, one-time password, password, payment, payment processor, pravin darbare, price, ramayana, reality, speech recognition, user (computing), vacation rental, weather forecasting, whatsapp, wi-fi
Pravin Darbare
Sr director data systems at Yapstone inc
analytics, authentication, big data and consumer behavior, contract, credit card, data consumption trends, data delivery transformation, data usage trends, financial transaction, future, information, joel mckelvey, join 2019, join 2019 sessions, link analysis, looker conference, looker conference 2019, machine learning, mobile app, one-time password, password, payment, payment processor, pravin darbare, price, ramayana, reality, speech recognition, user (computing), vacation rental, weather forecasting, whatsapp, wi-fi
Gideon McKee
Software Quality Engineer at Ping Identity
api, application software, authentication, cloud computing, command-line interface, communication protocol, cut, copy, and paste, email, end user, http cookie, hypertext transfer protocol, identity provider, javascript, login, one-time password, password, post/con, representational state transfer, scope (computer science), server-side, software , software development, software framework, web application, web browser, world wide web
Christopher Schultz
Chief Technology Officer at Total Child Health, Inc.
access control, active directory, apache tomcat, application firewall, application server, authenticator, certificate authority, certificate revocation list, common gateway interface, computer file, computer network, content delivery network, cross-site request forgery, cross-site scripting, database, domain name, domain name system, extended validation certificate, file-system permissions, firewall (computing), http cookie, https, hypertext transfer protocol, jakarta servlet, java (programming language), java virtual machine, let's encrypt, library (computing), lightweight directory access protocol, load balancing (computing), localhost, malware, modsecurity, nginx, one-time password, openldap, openssl, operating system, package manager, password, port (computer networking), powershell, proxy server, public key certificate, public key infrastructure, public-key cryptography, self-signed certificate, ssh (secure shell), telnet, transport layer security, tunneling protocol, web application, world wide web, zip (file format)
Eiji Kitamura
Developer Advocate at Google
#chromedevsummit, android (operating system), authentication, authenticator, biometric information, biometrics, chrome, chrome dev summit, chrome dev summit '19, chrome dev summit 19, chrome dev summit 2019, chrome developer summit, chrome developer summit 19, chrome developer summit 2019, chrome developers, digital signature, eiji kitamura, facial recognition system, fido alliance, google, google account, google chrome, google developers, google play, google search, http cookie, https, internet, internet forum, internet privacy, javascript, login, mobile marketing, multi-factor authentication, one-time password, password, password manager, personal identification number, phishing, point of sale, replay attack, security token, short message service, signing in users, signing up users, single sign-on, sms, the web, twitter, universal 2nd factor, usb, web application, web browser, webauthn, website, world wide web
1 2