Your Search

  • Theatre

    • Track 2: Cyber threat intelligence & technologies Remove
  • Streams

Reset Search
 

Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 11 of 11 results

|

Items per page:

Sort By
  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • Offensive Threat Models Against the Supply Chain

    Thursday10:00 - 10:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    This presentation focuses on applying a more adversarial threat model to supply chain systems that are integrated into client environments. After this session y...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • 5G Security: New Vulnerabilities, New Solutions

    Thursday13:20 - 14:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    5G will expose new vulnerabilities - new radio technologies, dynamic provisioning, virtualization, and automated orchestration - requiring new information secur...

    • Language: English

  • Using Passive DNS to Strengthen Incident Investigation & Response

    Thursday14:20 - 15:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Passive DNS can provide you with insight you normally don't have. In this session we explain what Passive DNS is, what it can do and how you can do it. After th...

    • Language: English

  • Using the Distributed Vulnerability Assessment to Improve the Security Level

    Thursday15:40 - 16:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    For measuring the security level of an infrastructure, the DVA model use the following parameters: 1 cyber-threat properties; 2 information of IT elements; 3 us...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.