Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 53 results

|

Items per page:

Sort By
  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

  • CPE Credits Helping to Massively Scale up the Next Generation of Cyber Professionals

    Thursday11:00 - 11:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Accelerating a diverse talent pipeline into the Profession, while earning CPE credits. ISACA-NYM members are mentoring students through virtual-internships to m...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

  • From Heist to Hostage Situation: The Rise of the Modern Bank Robbery

    Thursday13:20 - 14:1021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    With increases in destructive cyber-attacks and counter incident response, bank robberies in cyberspace are closer to hostage situations than heists. Tom will d...

    • Language: English

  • Using NIST Frameworks with COBIT 2019

    Thursday13:20 - 14:1021 Nov 2019
    Track 4: Security risk & compliance

    Learn about new processes for combining the benefits of NIST’s risk-based information security frameworks and ISACA’s updated COBIT 2019. After this session you...

    • Language: English

  • A New Employer-Driven Model of Cyber Workforce Development For Dell

    Thursday13:20 - 14:1021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The cyber training landscape produces over-credentialed, yet under-qualified, candidates, while employers lack clearly defined roles. We examine how job role an...

    • Language: English

  • 5G Security: New Vulnerabilities, New Solutions

    Thursday13:20 - 14:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    5G will expose new vulnerabilities - new radio technologies, dynamic provisioning, virtualization, and automated orchestration - requiring new information secur...

    • Language: English

  • Authorization Using Attributes

    Thursday13:20 - 14:1021 Nov 2019
    Track 1: Emerging security tools & techniques

    Most IAM Solutions focus on authentication which is a critical component of information security. Our discussion will be about authorization, specifically what ...

    • Language: English

  • Security Risks Your Auditors Care About in a Cloud Native & DevOps World

    Thursday14:20 - 15:1021 Nov 2019
    Track 4: Security risk & compliance

    APIs, Containers, automated pipelines, and DevOps - oh my! Software delivery is changing, and the risks and audit considerations are changing too. You'll hear a...

    • Language: English

  • The ROI of Information Security Teams

    Thursday14:20 - 15:1021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Many organizations have no clear cut roles for their InfoSec teams. As such there is redundancy in the roles and the teams do not perform to the optimal best. W...

    • Language: English

  • Using Passive DNS to Strengthen Incident Investigation & Response

    Thursday14:20 - 15:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Passive DNS can provide you with insight you normally don't have. In this session we explain what Passive DNS is, what it can do and how you can do it. After th...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.