Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 28 results

|

Items per page:

Sort By
  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons learn...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • Data Governance in the Analytics & Privacy Driven Era

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    With rapid rise in data-driven business models, there is an increasing need to harness the power of analytics while protecting privacy. Session will focus on ho...

    • Language: English

  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • Dynamic Information Security in a Static Organizational Culture

    Thursday10:00 - 10:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The presentation will discuss the need for static organizational cultures to become more flexible in meeting the demands of a dynamic information security frame...

    • Language: English

  • Offensive Threat Models Against the Supply Chain

    Thursday10:00 - 10:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    This presentation focuses on applying a more adversarial threat model to supply chain systems that are integrated into client environments. After this session y...

    • Language: English

  • Death by Automation: Accelerating Your SOC Using Open Source Tools

    Thursday10:00 - 10:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.