Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 86 results

|

Items per page:

Sort By
  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • Five Key Trends in Application Security

    Wednesday16:50 - 17:2020 Nov 2019
    Spotlight Educational Sessions

    Today’s hyper-connected businesses rely on a broad set of web, mobile, and API-based applications to connect customers, partners, and suppliers across the Inter...

    • Language: English

  • Optimize ITGC Testing by Automating User Access & Segregation of Duties Assessments

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    It’s time-consuming and repetitive to provide assurance over the effectiveness of IT controls. As the scope of IT assets expands to more cloud-based application...

    • Language: English

  • Addressing IT Security in an Evolving IT Industry

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    In this session, we'll discuss industry trends and how they are making it more challenging to manage and maintain a secure IT environment that's inclusive of bo...

    • Language: English

  • Staying in the Dark: How Intelligence Analysts are using Data, Context and Automation to Combat Cyber Threats

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    The consequences of cybercrime originating from the dark web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percen...

    • Language: English

  • The Overlooked Risks of Cybersecurity Automation

    Thursday08:40 - 09:3021 Nov 2019
    Track 6: Industry Trends & Insights

    In this session, we will explore some of the most common implementations of automation for cybersecurity programs and the associated risks. We'll look at real-w...

    • Language: English

  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the draft Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.