Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 20 results

|

Items per page:

Sort By
  • The Overlooked Risks of Cybersecurity Automation

    Thursday08:40 - 09:3021 Nov 2019
    Track 6: Industry Trends & Insights

    In this session, we will explore some of the most common implementations of automation for cybersecurity programs and the associated risks. We'll look at real-w...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • How to Communicate Your Risk & Security Program Value to Executives

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    Innovation Session Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives to...

    • Language: English

  • How to Use Your CAAT to Prevent Ghosting with One Snap

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Work smarter, not harder. With Robotic Process Automation (RPA) on the rise in the Audit industry, learn how Ally Financial has identified opportunities to auto...

    • Language: English

  • A New Strategy for Effective Cybersecurity Awareness Campaigns

    Thursday10:00 - 10:5021 Nov 2019
    Track 6: Industry Trends & Insights

    There are major forces at play attempting to exploit your weakest link – People. As networks become harder to breach, hackers are increasingly targeting staff a...

    • Language: English

  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • Fighting Crime with Compliance: SOC for Cybersecurity

    Thursday11:00 - 11:5021 Nov 2019
    Track 6: Industry Trends & Insights

    Today’s technology landscape is plagued with hackers and cyber criminals looking to compromise sensitive information from businesses of all industries and sizes...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.