Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 19 results

|

Items per page:

Sort By
  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • The Collision Course Between Big Data & AI, Privacy, Ethics & Regulations in the AI + IoT World

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will explore how GDPR is a great blueprint, why tighter data-retention policies are needed, the pressures of effective AI and IoT, and then assess both sides...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Exposing the Dark Overlord: Using OSINT to Identify a Group of Modern-Day Cyber Terrorists

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk focuses on exploring the OSINT tools, investigative thought process, and collection of dark web data that led to the identification of The Dark Overlo...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.