Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 81 results

|

Items per page:

Sort By
  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • Five Key Trends in Application Security

    Wednesday16:50 - 17:1020 Nov 2019
    Spotlight Educational Sessions

    Today’s hyper-connected businesses rely on a broad set of web, mobile, and API-based applications to connect customers, partners, and suppliers across the Inter...

    • Language: English

  • Staying in the Dark: How Intelligence Analysts are using Data, Context and Automation to Combat Cyber Threats

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    The consequences of cybercrime originating from the dark web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percen...

    • Language: English

  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the draft Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • Forensics as a Service

    Thursday09:30 - 10:1521 Nov 2019
    Geek Street

    The cloud platforms present new and unique challenges to the Security Professionals and Digital Forensics Investigators in their efforts to assist organizations...

    • Language: English

  • The Building Blocks of Risk Management: Be Visible or Stay In the Dark

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    The need for risk management has grown dramatically over the past couple of decades.  Companies are embracing technology like they never have before.  Digital p...

    • Language: English

  • How to Use Your CAAT to Prevent Ghosting with One Snap

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Work smarter, not harder. With Robotic Process Automation (RPA) on the rise in the Audit industry, learn how Ally Financial has identified opportunities to auto...

    • Language: English

  • Cyber Security Awareness for Dummies

    Thursday10:00 - 10:5021 Nov 2019
    Track 6: Industry Trends & Insights

    There are major forces at play attempting to exploit your weakest link – People. As networks become harder to breach, hackers are increasingly targeting staff a...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.