Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

49 - 60 of 81 results

|

Items per page:

Sort By
  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • From Zero Awareness to Accelerating & Scaling a Diverse Nextgen into Cyber & Risk Professionals

    Thursday10:00 - 10:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The presentation will discuss the need for static organizational cultures to become more flexible in meeting the demands of a dynamic information security frame...

    • Language: English

  • Offensive Threat Models Against the Supply Chain

    Thursday10:00 - 10:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    This presentation focuses on applying a more adversarial threat model to supply chain systems that are integrated into client environments. After this session y...

    • Language: English

  • Death by Automation: Accelerating Your SOC Using Open Source Tools

    Thursday10:00 - 10:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...

    • Language: English

  • Threat Perspective from a Reformed Red Teamer

    Thursday10:25 - 11:1021 Nov 2019
    Geek Street

    Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and cond...

    • Language: English

  • Fighting Crime with Compliance: SOC for Cybersecurity

    Thursday11:00 - 11:5021 Nov 2019
    Track 6: Industry Trends & Insights

    Today’s technology landscape is plagued with hackers and cyber criminals looking to compromise sensitive information from businesses of all industries and sizes...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

  • CPE Credits Helping to Massively Scale up the Next Generation of Cyber Professionals

    Thursday11:00 - 11:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Accelerating a diverse talent pipeline into the Profession, while earning CPE credits. ISACA-NYM members are mentoring students through virtual-internships to m...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

  • An Attack on an API Server: What Happened & What Were the Malicious Actors Looking For

    Thursday11:20 - 12:0521 Nov 2019
    Geek Street

    The explosion of APIs is creating incremental security risks that must be addressed, considering that over half of the internet traffic is bot or API based. Aft...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.