Security Featured Speakers


Patrick Morley

SVP, GM, Security Business Unit,

Renu Upadhyay

VP, Product Marketing EUC,

Dr. Amelia Estwick

Director, Threat Research,


With VMware, customers can implement Zero Trust with fewer tools and silos, deliver security as a built-in distributed
service and scale response with confidence, speed, and accuracy.


Implement Zero Trust Security:

To implement a Zero Trust strategy, siloed teams, processes, and technologies must connect and align.

You need real-time intelligence to orchestrate security controls across distributed environments. By architecting security into your infrastructure, you gain authoritative context of your environment through connected control points and reduce the attack surface without adding operational complexity.

Simplify your journey to Zero Trust with VMware and learn best practices, design principles and tactical implementation guides tried and tested by VMware and our customers.

Featured Sessions

How to More Effectively Secure App Egress

Arch Capital's Journey in Securing the Cloud with CloudHealth Secure State

Cloud Workload Protection, Simplified

Modernize the Security Operations Center:

SOC teams are understaffed, facing alert overload and struggling with disparate tools.

Discover a new approach to security operations, one which detects and responds to threats against apps and data within any cloud or remote environment. Improve context into risks and threats, respond collaboratively between controls and teams, and ensure visibility across an increasingly distributed IT infrastructure.

Join us and learn how to evolve your SOC with the MITRE ATT&CK Framework, how to prevent ransomware attacks, and experience extended detection and response (XDR) live, among other things. 

Featured Sessions

Secure Modern Apps & Cloud Services:

The rapidly expanding attack surface requires organizations to shift from reacting to threats to proactively anticipating and managing risks.

Security, IT and DevOps teams need shared, real-time visibility into cloud workloads, containers, applications and services.

Leverage your infrastructure and applications as your security controls and focus on risk-prioritized vulnerabilities.

Protect critical workloads across any environment. Remove operational hurdles, focus on high-impact actions with confidence and break down silos to reduce risk faster with VMware.

Hear from our customers and security experts on how you too can modernize your infrastructure and applications without compromising security. 

Featured Sessions

Secure the Anywhere Workforce:

Today’s workforce faces key challenges such as fragmented security, operational complexity and subpar experiences.

These issues require rethinking how you enable seamless workspaces without limitation.

Join us to learn how you can enable employees to work from anywhere with secure, frictionless experiences.

Featured Sessions

Secure the Multi-Cloud:

Applications span multiple clouds, and apps and data flow continuously to an increasingly distributed workforce. The trusted perimeter is largely obliterated, exposing security that is often arbitrary and incomplete in the face of an expanding, evolving threat landscape.

The consensus is that a Zero Trust approach to network architecture is the optimal security posture, but operationalizing it across a heterogeneous infrastructure is no small task. Complete coverage can be achieved with a converged networking and security stack that puts security next to every workload, and protects all app-to-app communications—inside and among clouds.

Cloud workload protection, identity-based segmentation, secure cloud-to-cloud connectivity, and ubiquitous network threat prevention unite to secure the multi-cloud, deliver end-to-end security visibility with correlative workflows that maximize effective responses, and consolidate security functions for reduced CapEx and OpEx.

Featured Sessions