Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

13 - 24 of 53 results

|

Items per page:

Sort By
  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

  • Effective Key Steps into Digital Forensics & Incident Response (DFIR)

    Wednesday14:20 - 15:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Key steps and highlights you need to be aware of while handling real cyber incidents After this session you will be able to: Better prepare for cyber inciden...

    • Language: English

  • Implementing a Cybersecurity Skills Competencies Framework

    Wednesday14:20 - 15:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    The session will provide an insight, based on recent practical experience, into tools that can be used to implement a skills competencies framework & the suppor...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Exposing the Dark Overlord: Using OSINT to Identify a Group of Modern-Day Cyber Terrorists

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk focuses on exploring the OSINT tools, investigative thought process, and collection of dark web data that led to the identification of The Dark Overlo...

    • Language: English

  • Making Cents of Maturity: Building Resistive Strength

    Wednesday14:40 - 15:1020 Nov 2019
    Track 4: Security risk & compliance

    Users will be engulfed in the land of cyber security controls in relation to GRC. Using a quantitative analysis framework, FAIR the program prioritizes controls...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • Next Gen Risk Assessment: Can it Save My Bacon Both with Regulators & in Litigation?

    Wednesday15:40 - 16:3020 Nov 2019
    Track 4: Security risk & compliance

    A discussion of the new Duty of Care Risk Assessment  methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discus...

    • Language: English

  • Privacy & Ethics are the Headlines: How Does a Business Leader Cope & Capitalize

    Wednesday15:40 - 16:3020 Nov 2019
    Track 3: Cybersecurity leadership & development

    For enterprise security leaders, an amazing opportunity to treat the consumer as an informed partner using privacy and ethics as a competitive differentiator Af...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.