Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 64 of 79 results

|

Items per page:

Sort By
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    Wednesday08:30 - 09:3020 Nov 2019
    Keynote

    As Former White House CIO, and CEO of Fortalice Solutions, Theresa will draw on her extensive cybersecurity experience to discuss the intersection of the workpl...

    • Language: English

  • Practical Approach to XSS Exploitation & Defense

    Wednesday09:30 - 10:1520 Nov 2019
    Geek Street

    Cross Site Scripting (XSS) has always been one of the Top 10 application vulnerabilities according to OWASP. This is a security vulnerability in web application...

    • Language: English

  • Innovation Stage

    Wednesday10:00 - 17:0020 Nov 2019
    Innovation Stage

    Agenda coming soon...

    • Language: English

  • Take a Ride on the Dark Side: Data on the Dark Web

    Wednesday10:00 - 10:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Not many days go by without hearing about a new breach releasing data of hundreds, thousands and sometimes millions of people. What happens with that data? How ...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Hacking to Teach Cyber Awareness in an Organization

    Wednesday10:00 - 10:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Using hacking tools and tactics to make an impact on your organizations culture about security awareness. How real life examples and hacking use cases of cowork...

    • Language: English

  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • Planning Complex Cyber Audits. The Case of Galileo Ground Segment (1,500 MEuros)

    Wednesday10:25 - 11:1020 Nov 2019
    Geek Street

    The Galileo program represents the biggest program in Europe related to the Navigation Systems. The session will highlight the main challenges to plan cyber-aud...

    • Language: English

  • The Collision Course Between Big Data & AI, Privacy, Ethics & Regulations in the AI + IoT World

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will explore how GDPR is a great blueprint, why tighter data-retention policies are needed, the pressures of effective AI and IoT, and then assess both sides...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Cyber Leadership in an Ecosystem Context

    Wednesday11:00 - 11:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Cyber leaders are ill-prepared for the enormity of their task. It’s now about rallying disparate teams across a sprawling ecosystem and applying highly-nuanced ...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Systemic Flaws in the Internet of Things

    Wednesday11:20 - 12:0520 Nov 2019
    Geek Street

    Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...

    • Language: English

  • Machines, Icebergs, and Headlines: Machine Identities and Their Need for Protection

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication and encryption even...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit to taking data when...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • How to Articulate the Value of Information Security to Senior Management?

    Wednesday13:20 - 14:1020 Nov 2019
    Track 4: Security risk & compliance

    One of the major challenges is presenting IS value or the return on security investment (ROSI). This session aims to provide elements allowing CISOs to design a...

    • Language: English

  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

  • Meet the Bots: Our New Security Auditors

    Wednesday14:05 - 14:5020 Nov 2019
    Geek Street

    RPA brings in dramatic efficiencies, reduces the documentation burden and audit fatigue along with round the clock monitoring. RPA is the first step towards bui...

    • Language: English

  • Effective Key Steps into Digital Forensics & Incident Response (DFIR)

    Wednesday14:20 - 15:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Key steps and highlights you need to be aware of while handling real cyber incidents After this session you will be able to: Better prepare for cyber incident...

    • Language: English

  • Implementing a Cybersecurity Skills Competencies Framework

    Wednesday14:20 - 15:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    The session will provide an insight, based on recent practical experience, into tools that can be used to implement a skills competencies framework & the suppor...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Catching Cyber Criminals: Investigative Techniques to Identify Modern Threat Actors & the Clues They Leave Behind During Data Breaches

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will provide insight into modern threat groups like The Dark Overlord, MABNA, and Gnostic Players. The discussion will detail the formation of the gro...

    • Language: English

  • Making Cents of Maturity: Building Resistive Strength

    Wednesday14:40 - 15:1020 Nov 2019
    Track 4: Security risk & compliance

    Users will be engulfed in the land of cyber security controls in relation to GRC. Using a quantitative analysis framework, FAIR the program prioritizes controls...

    • Language: English

  • University and Education Partnerships

    Wednesday15:15 - 15:3520 Nov 2019
    Innovation Stage

    In this session, we will discuss the role of universities to support industry by providing flexible outcome focused curriculum designed to overcome the cybersec...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • Next Gen Risk Assessment: Can it Save My Bacon Both with Regulators & in Litigation?

    Wednesday15:40 - 16:3020 Nov 2019
    Track 4: Security risk & compliance

    A discussion of the new Duty of Care Risk Assessment  methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discus...

    • Language: English

  • Privacy & Ethics are the Headlines: How Does a Business Leader Cope & Capitalize

    Wednesday15:40 - 16:3020 Nov 2019
    Track 3: Cybersecurity leadership & development

    For enterprise security leaders, an amazing opportunity to treat the consumer as an informed partner using privacy and ethics as a competitive differentiator Af...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • Five Key Trends in Application Security

    Wednesday16:50 - 17:1020 Nov 2019
    Spotlight Educational Sessions

    Today’s hyper-connected businesses rely on a broad set of web, mobile, and API-based applications to connect customers, partners, and suppliers across the Inter...

    • Language: English

  • Staying in the Dark: How Intelligence Analysts are using Data, Context and Automation to Combat Cyber Threats

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    The consequences of cybercrime originating from the dark web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percen...

    • Language: English

  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the draft Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • Forensics as a Service

    Thursday09:30 - 10:1521 Nov 2019
    Geek Street

    The cloud platforms present new and unique challenges to the Security Professionals and Digital Forensics Investigators in their efforts to assist organizations...

    • Language: English

  • The Building Blocks of Risk Management: Be Visible or Stay In the Dark

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    The need for risk management has grown dramatically over the past couple of decades.  Companies are embracing technology like they never have before.  Digital p...

    • Language: English

  • How to Use Your CAAT to Prevent Ghosting with One Snap

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Work smarter, not harder. With Robotic Process Automation (RPA) on the rise in the Audit industry, learn how Ally Financial has identified opportunities to auto...

    • Language: English

  • Cyber Security Awareness for Dummies

    Thursday10:00 - 10:5021 Nov 2019
    Track 6: Industry Trends & Insights

    There are major forces at play attempting to exploit your weakest link – People. As networks become harder to breach, hackers are increasingly targeting staff a...

    • Language: English

  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • From Zero Awareness to Accelerating & Scaling a Diverse Nextgen into Cyber & Risk Professionals

    Thursday10:00 - 10:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The presentation will discuss the need for static organizational cultures to become more flexible in meeting the demands of a dynamic information security frame...

    • Language: English

  • Offensive Threat Models Against the Supply Chain

    Thursday10:00 - 10:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    This presentation focuses on applying a more adversarial threat model to supply chain systems that are integrated into client environments. After this session y...

    • Language: English

  • Death by Automation: Accelerating Your SOC Using Open Source Tools

    Thursday10:00 - 10:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...

    • Language: English

  • Threat Perspective from a Reformed Red Teamer

    Thursday10:25 - 11:1021 Nov 2019
    Geek Street

    Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and cond...

    • Language: English

  • Fighting Crime with Compliance: SOC for Cybersecurity

    Thursday11:00 - 11:5021 Nov 2019
    Track 6: Industry Trends & Insights

    Today’s technology landscape is plagued with hackers and cyber criminals looking to compromise sensitive information from businesses of all industries and sizes...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

  • CPE Credits Helping to Massively Scale up the Next Generation of Cyber Professionals

    Thursday11:00 - 11:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Accelerating a diverse talent pipeline into the Profession, while earning CPE credits. ISACA-NYM members are mentoring students through virtual-internships to m...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

  • An Attack on an API Server: What Happened & What Were the Malicious Actors Looking For

    Thursday11:20 - 12:0521 Nov 2019
    Geek Street

    The explosion of APIs is creating incremental security risks that must be addressed, considering that over half of the internet traffic is bot or API based. Aft...

    • Language: English

  • Securing an IoT Endpoint from Creation to Cloud

    Thursday12:15 - 13:0021 Nov 2019
    Geek Street

    While a great deal of emphasis is given on securing different components of a device ecosystem, one often misses that the time of an attack, and the time of thr...

    • Language: English

  • Vendor Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges

    Thursday12:40 - 13:0021 Nov 2019
    Innovation Stage

    Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulations. While outsourcin...

    • Language: English

  • From Heist to Hostage Situation: The Rise of the Modern Bank Robbery

    Thursday13:20 - 14:1021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    With increases in destructive cyber-attacks and counter incident response, bank robberies in cyberspace are closer to hostage situations than heists. Tom will d...

    • Language: English

  • Using NIST Frameworks with COBIT 2019

    Thursday13:20 - 14:1021 Nov 2019
    Track 4: Security risk & compliance

    Learn about new processes for combining the benefits of NIST’s risk-based information security frameworks and ISACA’s updated COBIT 2019. After this session you...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.