Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

13 - 24 of 99 results

|

Items per page:

Sort By
  • Analyst View: Cybersecurity & Big Data Pay, Jobs, Skills/Certifications Review & Forecast

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Tech labor research firm Foote Partners' deep-dive analysis of the current/future state of Big Data and Cybersecurity jobs, compensation, hot skills and certifi...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Cyber Leadership in an Ecosystem Context

    Wednesday11:00 - 11:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Cyber leaders are ill-prepared for the enormity of their task. It’s now about rallying disparate teams across a sprawling ecosystem and applying highly-nuanced ...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Systemic Flaws in the Internet of Things

    Wednesday11:20 - 12:0520 Nov 2019
    Geek Street

    Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...

    • Language: English

  • Magecart & Beyond. Massive Client-Side Website Vulnerability

    Wednesday11:25 - 11:4520 Nov 2019
    Innovation Stage

    Technology Showcase Session This session will discuss how modern website architecture has presented an expansive and lucrative attack surface for hackers. Inci...

    • Language: English

  • Identities, Icebergs, and Headlines

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Innovation Session Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Innovation Session Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • Trust but Verify: Building a Third-Party Cyber Risk Program

    Wednesday13:20 - 14:1020 Nov 2019
    Track 6: Industry Trends & Insights

    Over 60% of breaches are caused by a third-party, making your organization's partners, vendors, and suppliers one of your most significant vulnerabilities. Yet,...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.