Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 11 of 11 results

|

Items per page:

Sort By
  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

  • Catching Cyber Criminals: Investigative Techniques to Identify Modern Threat Actors & the Clues They Leave Behind During Data Breaches

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will provide insight into modern threat groups like The Dark Overlord, MABNA, and Gnostic Players. The discussion will detail the formation of the gro...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • Death by Automation: Accelerating Your SOC Using Open Source Tools

    Thursday10:00 - 10:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

  • Authorization Using Attributes

    Thursday13:20 - 14:1021 Nov 2019
    Track 1: Emerging security tools & techniques

    Most IAM Solutions focus on authentication which is a critical component of information security. Our discussion will be about authorization, specifically what ...

    • Language: English

  • Assessing Integrated Risk Intelligently

    Thursday14:20 - 15:1021 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will introduce and demonstrate a new approach for categorizing and measuring integrated risk in complex organizations. Based on rigorous research cond...

    • Language: English

  • Modernize Your Incident Response Program for the Cloud

    Thursday15:40 - 16:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    This session will focus on real life processes to manage an efficient incident response lifecycle in modern cloud world. Additionally, we cover how to prioritiz...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.