Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 81 results

|

Items per page:

Sort By
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    Wednesday08:30 - 09:3020 Nov 2019
    Keynote

    As Former White House CIO, and CEO of Fortalice Solutions, Theresa will draw on her extensive cybersecurity experience to discuss the intersection of the workpl...

    • Language: English

  • Practical Approach to XSS Exploitation & Defense

    Wednesday09:30 - 10:1520 Nov 2019
    Geek Street

    Cross Site Scripting (XSS) has always been one of the Top 10 application vulnerabilities according to OWASP. This is a security vulnerability in web application...

    • Language: English

  • Innovation Stage

    Wednesday10:00 - 17:0020 Nov 2019
    Innovation Stage

    Agenda coming soon...

    • Language: English

  • Take a Ride on the Dark Side: Data on the Dark Web

    Wednesday10:00 - 10:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Not many days go by without hearing about a new breach releasing data of hundreds, thousands and sometimes millions of people. What happens with that data? How ...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Hacking to Teach Cyber Awareness in an Organization

    Wednesday10:00 - 10:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Using hacking tools and tactics to make an impact on your organizations culture about security awareness. How real life examples and hacking use cases of cowork...

    • Language: English

  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • Planning Complex Cyber Audits. The Case of Galileo Ground Segment (1,500 MEuros)

    Wednesday10:25 - 11:1020 Nov 2019
    Geek Street

    The Galileo program represents the biggest program in Europe related to the Navigation Systems. The session will highlight the main challenges to plan cyber-aud...

    • Language: English

  • The Collision Course Between Big Data & AI, Privacy, Ethics & Regulations in the AI + IoT World

    The Collision Course Between Big Data & AI, Privacy, Ethics & Regulations in the AI + IoT World We will explore how GDPR is a great blueprint, why tighter data-retention policies are needed, the...

    Updated 1 month ago

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Cyber Leadership in an Ecosystem Context

    Wednesday11:00 - 11:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Cyber leaders are ill-prepared for the enormity of their task. It’s now about rallying disparate teams across a sprawling ecosystem and applying highly-nuanced ...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Systemic Flaws in the Internet of Things

    Wednesday11:20 - 12:0520 Nov 2019
    Geek Street

    Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...

    • Language: English

  • Machines, Icebergs, and Headlines: Machine Identities and Their Need for Protection

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication and encryption even...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit to taking data when...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • How to Articulate the Value of Information Security to Senior Management?

    Wednesday13:20 - 14:1020 Nov 2019
    Track 4: Security risk & compliance

    One of the major challenges is presenting IS value or the return on security investment (ROSI). This session aims to provide elements allowing CISOs to design a...

    • Language: English

  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.