Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 16 results

|

Items per page:

Sort By
  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • How to Articulate the Value of Information Security to Senior Management?

    Wednesday13:20 - 14:1020 Nov 2019
    Track 4: Security risk & compliance

    One of the major challenges is presenting IS value or the return on security investment (ROSI). This session aims to provide elements allowing CISOs to design a...

    • Language: English

  • Effective Key Steps into Digital Forensics & Incident Response (DFIR)

    Wednesday14:20 - 15:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Key steps and highlights you need to be aware of while handling real cyber incidents After this session you will be able to: Better prepare for cyber incident...

    • Language: English

  • Implementing a Cybersecurity Skills Competencies Framework

    Wednesday14:20 - 15:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    The session will provide an insight, based on recent practical experience, into tools that can be used to implement a skills competencies framework & the suppor...

    • Language: English

  • Making Cents of Maturity: Building Resistive Strength

    Wednesday14:40 - 15:1020 Nov 2019
    Track 4: Security risk & compliance

    Users will be engulfed in the land of cyber security controls in relation to GRC. Using a quantitative analysis framework, FAIR the program prioritizes controls...

    • Language: English

  • Next Gen Risk Assessment: Can it Save My Bacon Both with Regulators & in Litigation?

    Wednesday15:40 - 16:3020 Nov 2019
    Track 4: Security risk & compliance

    A discussion of the new Duty of Care Risk Assessment  methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discus...

    • Language: English

  • Staying in the Dark: How Intelligence Analysts are using Data, Context and Automation to Combat Cyber Threats

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    The consequences of cybercrime originating from the dark web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percen...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • Forensics as a Service

    Thursday09:30 - 10:1521 Nov 2019
    Geek Street

    The cloud platforms present new and unique challenges to the Security Professionals and Digital Forensics Investigators in their efforts to assist organizations...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.