Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 44 results

|

Items per page:

Sort By
  • How to Avoid a Data Breach

    Wednesday09:35 - 09:5520 Nov 2019
    Innovation Stage

    Innovation Session This session will take a look at the general state of cybersecurity and discuss the results of Ponemon State of Cybersecurity Research result...

    • Language: English

  • Quantifying Unknown Cyber Risks

    Wednesday10:00 - 10:5020 Nov 2019
    Track 6: Industry Trends & Insights

    In Expanse's research, we see that most organizations have cyber assets they aren't aware of, and because they aren't aware of them, these assets increase the r...

    • Language: English

  • Take a Ride on the Dark Side: Data on the Dark Web

    Wednesday10:00 - 10:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Not many days go by without hearing about a new breach releasing data of hundreds, thousands and sometimes millions of people. What happens with that data? How ...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • Improve Security, Privacy & Compliance with Continuous Oversight

    Wednesday11:00 - 11:5020 Nov 2019
    Track 6: Industry Trends & Insights

    The concept of monitoring information system security has long been recognized as sound and valuable management practice.  For additional consideration, a large...

    • Language: English

  • Analyst View: Cybersecurity & Big Data Pay, Jobs, Skills/Certifications Review & Forecast

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Tech labor research firm Foote Partners' deep-dive analysis of the current/future state of Big Data and Cybersecurity jobs, compensation, hot skills and certifi...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Machines, Icebergs, and Headlines: Machine Identities and Their Need for Protection

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Innovation Session Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Innovation Session Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.