Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 6 of 6 results

|

Items per page:

Sort By
  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • University and Education Partnerships

    Wednesday15:15 - 15:3520 Nov 2019
    Innovation Stage

    In this session, we will discuss the role of universities to support industry by providing flexible outcome focused curriculum designed to overcome the cybersec...

    • Language: English

  • Using NIST Frameworks with COBIT 2019

    Thursday13:20 - 14:1021 Nov 2019
    Track 4: Security risk & compliance

    Learn about new processes for combining the benefits of NIST’s risk-based information security frameworks and ISACA’s updated COBIT 2019. After this session you...

    • Language: English

  • Using Passive DNS to Strengthen Incident Investigation & Response

    Thursday14:20 - 15:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Passive DNS can provide you with insight you normally don't have. In this session we explain what Passive DNS is, what it can do and how you can do it. After th...

    • Language: English

  • Using the Distributed Vulnerability Assessment to Improve the Security Level

    Thursday15:40 - 16:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    For measuring the security level of an infrastructure, the DVA model use the following parameters: 1 cyber-threat properties; 2 information of IT elements; 3 us...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.