Enterprise Connect is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Enterprise Connect expert-led conference program will discuss the latest systems, software, services and applications for enterprise communications and collaboration. The conference is designed with one objective in mind: To help you optimize your investments in communications and collaboration systems, software and services. ALL TIMES LISTED ARE (U.S.) EASTERN TIME ZONE.

The Evolution of Security in Communications


Brett Shockley  (Cofounder and CEO , Journey)

Mark Collier  (Chief Technology Officer , SecureLogix)

Rich Krizan  (Analytics and Security Product Management, Ribbon)

Noah Rafalko  (Chief Executive Officer, TSG Global, Inc.)


Sorell Slaymaker  (Principal Consulting Analyst, TechVision Research)

Date: Tuesday, September 28

Time: 5:00pm - 5:45pm

Track : Management, Networks & Security

Session Type: Virtual Conference Session

Vault Recording: TBD

Communications capabilities have advanced tremendously over the past several years—has your security posture kept up? We’ve learned how to fight toll fraud and more recently, denial-of-service attacks against contact centers and other enterprise divisions. But hackers and nation states are getting more sophisticated and not only spoofing caller ID, but also someone’s voice. Plus securing video communications is a whole new challenge, and one that few enterprises have yet engaged with. Additionally, security best practices around zero-trust, identity verification, data/document sharing, and storage such as recorded video sessions require additional security controls So how do you prepare your organization to ensure your communications are secure? In this session, an industry-leading consultant will address todays’ communication security challenges and industry best practices to address them. You’ll come away with an appropriate level of paranoia, and—more importantly—a set of actions you can take to alleviate that paranoia.


  • What are the ramifications of zero-trust for communications security, and how do you apply it to your environment? How does Zero Knowledge authentication fit into the zero-trust framework.
  • Now that collaboration applications allow for widespread sharing of documents and recording of videos, how can you ensure that repositories for this data meet the security requirements imposed elsewhere in your enterprise IT environment.
  • What’s the best way to ensure trust when it comes to incoming communications? How do you make sure these communications are coming from the person or organization they say they’re from, and what are your options for verifying identity?
  • What are the elements of a multi-channel approach that you can develop to optimize your defense against security attacks, such as spear phishing, that come through communications channels?