Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 64 of 99 results

|

Items per page:

Sort By
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    Wednesday08:30 - 09:3020 Nov 2019
    Keynote

    New technologies are in the news every day but is it all just hype or a true workplace reality? Are you leveraging Blockchain, Cryptocurrency, Artificial Intell...

    • Language: English

  • Practical Approach to Application Security Assessment

    Wednesday09:30 - 10:1520 Nov 2019
    Geek Street

    Cross Site Scripting (XSS) has always been one of the Top 10 application vulnerabilities according to OWASP. This is a security vulnerability in web application...

    • Language: English

  • How to Avoid a Data Breach

    Wednesday09:35 - 09:5520 Nov 2019
    Innovation Stage

    Innovation Session This session will take a look at the general state of cybersecurity and discuss the results of Ponemon State of Cybersecurity Research result...

    • Language: English

  • Quantifying Unknown Cyber Risks

    Wednesday10:00 - 10:5020 Nov 2019
    Track 6: Industry Trends & Insights

    In Expanse's research, we see that most organizations have cyber assets they aren't aware of, and because they aren't aware of them, these assets increase the r...

    • Language: English

  • Take a Ride on the Dark Side: Data on the Dark Web

    Wednesday10:00 - 10:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Not many days go by without hearing about a new breach releasing data of hundreds, thousands and sometimes millions of people. What happens with that data? How ...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Hacking to Teach Cyber Awareness in an Organization

    Wednesday10:00 - 10:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Using hacking tools and tactics to make an impact on your organizations culture about security awareness. How real life examples and hacking use cases of cowork...

    • Language: English

  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • Planning Complex Cyber Audits. The Case of Galileo Ground Segment (1,500 MEuros)

    Wednesday10:25 - 11:1020 Nov 2019
    Geek Street

    The Galileo program represents the biggest program in Europe related to the Navigation Systems. The session will highlight the main challenges to plan cyber-aud...

    • Language: English

  • Do You Know If Your IT Infrastructure Is Secure? Explore How to Answer This Question & Hear True Tales from the Cybersecurity Trenches

    Wednesday11:00 - 11:2020 Nov 2019
    Innovation Stage

    Technology Showcase Session Every day there are new cyber breaches reported as the threat landscape is evolving at a lightning pace.  It’s more important than ...

    • Language: English

  • Improve Security, Privacy & Compliance with Continuous Oversight

    Wednesday11:00 - 11:5020 Nov 2019
    Track 6: Industry Trends & Insights

    The concept of monitoring information system security has long been recognized as sound and valuable management practice.  For additional consideration, a large...

    • Language: English

  • Analyst View: Cybersecurity & Big Data Pay, Jobs, Skills/Certifications Review & Forecast

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Tech labor research firm Foote Partners' deep-dive analysis of the current/future state of Big Data and Cybersecurity jobs, compensation, hot skills and certifi...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    Industrial Control Systems (ICS) are everywhere; Whether a Building Management System or a manufacturing process, ICS are highly vulnerable to Cyber threats. Le...

    • Language: English

  • Cyber Leadership in an Ecosystem Context

    Wednesday11:00 - 11:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Cyber leaders are ill-prepared for the enormity of their task. It’s now about rallying disparate teams across a sprawling ecosystem and applying highly-nuanced ...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Systemic Flaws in the Internet of Things

    Wednesday11:20 - 12:0520 Nov 2019
    Geek Street

    Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...

    • Language: English

  • Magecart & Beyond. Massive Client-Side Website Vulnerability

    Wednesday11:25 - 11:4520 Nov 2019
    Innovation Stage

    Technology Showcase Session This session will discuss how modern website architecture has presented an expansive and lucrative attack surface for hackers. Inci...

    • Language: English

  • Identities, Icebergs, and Headlines

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Innovation Session Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Innovation Session Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • Trust but Verify: Building a Third-Party Cyber Risk Program

    Wednesday13:20 - 14:1020 Nov 2019
    Track 6: Industry Trends & Insights

    Over 60% of breaches are caused by a third-party, making your organization's partners, vendors, and suppliers one of your most significant vulnerabilities. Yet,...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • Security Key Point Indicators or "How to Measure Security from the Governance Perspective"

    Wednesday13:20 - 14:1020 Nov 2019
    Track 4: Security risk & compliance

    Having reliable indicators is imperative to be able to assess risks and develop reliable reports for IS decision-making bodies. This session aims to provide ele...

    • Language: English

  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • Tapestry: Assessing Integrated Risk Intelligently

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will introduce and demonstrate a new approach for categorizing and measuring integrated risk in complex organizations. Based on rigorous research cond...

    • Language: English

  • Inserting Code Analysis into CI w/o Slowing Builds Down

    Wednesday13:25 - 13:4520 Nov 2019
    Innovation Stage

    This session will cover a demonstration of static application security testing (SAST) can be inserted into CI tools to analysis each build w/o out slowing down ...

    • Language: English

  • The Road to Continuous IT Controls: Bringing a DevOps Discipline to the IT Audit Ecosystem

    Wednesday13:50 - 14:1020 Nov 2019
    Innovation Stage

    Technology Showcase The error-prone, manual nature of SOC and other IT security audits can kill business velocity and team morale for at least 2-3 months every...

    • Language: English

  • Meet the Bots: Our New Security Auditors

    Wednesday14:05 - 14:5020 Nov 2019
    Geek Street

    RPA brings in dramatic efficiencies, reduces the documentation burden and audit fatigue along with round the clock monitoring. RPA is the first step towards bui...

    • Language: English

  • Turn Corp Compliance Policies into Testable Requirement for the Mainframe

    Wednesday14:20 - 15:1020 Nov 2019
    Track 6: Industry Trends & Insights

    A discussion about the pitfalls and failures that occur with corporate compliance and how to avoid them. After completing this session you will be able to: S...

    • Language: English

  • Cyber AI: Fighting Back with Autonomous Response

    Wednesday14:20 - 14:4020 Nov 2019
    Innovation Stage

    The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safegua...

    • Language: English

  • Effective Key Steps into Digital Forensics & Incident Response (DFIR)

    Wednesday14:20 - 15:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Key steps and highlights you need to be aware of while handling real cyber incidents After this session you will be able to: Better prepare for cyber incident...

    • Language: English

  • Making Cents of Maturity: Building Resistive Strength

    Wednesday14:20 - 15:1020 Nov 2019
    Track 4: Security risk & compliance

    Users will be engulfed in the land of cyber security controls in relation to GRC. Using a quantitative analysis framework, FAIR the program prioritizes controls...

    • Language: English

  • Implementing a Cybersecurity Skills Competencies Framework

    Wednesday14:20 - 15:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    The session will provide an insight, based on recent practical experience, into tools that can be used to implement a skills competencies framework & the suppor...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Catching Cyber Criminals: Investigative Techniques to Identify Modern Threat Actors & the Clues They Leave Behind During Data Breaches

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will provide insight into modern threat groups like The Dark Overlord, MABNA, and Gnostic Players. The discussion will detail the formation of the gro...

    • Language: English

  • See Every Asset. Secure What Matters.

    Wednesday14:45 - 15:0520 Nov 2019
    Innovation Stage

    When it comes to reducing cyber exposure, an effective vulnerability management approach can help eliminate blind spots that are often the root of security issu...

    • Language: English

  • Secure Composition: How Tooling Can Improve Security

    Wednesday15:00 - 15:4520 Nov 2019
    Geek Street

    Lessons learned in Google engineering about how tools are ideally placed to preserve important security properties. This talk discusses template languages, a wi...

    • Language: English

  • University and Education Partnerships

    Wednesday15:15 - 15:3520 Nov 2019
    Innovation Stage

    Innovation Session In this session, we will discuss the role of universities to support industry by providing flexible outcome focused curriculum designed to o...

    • Language: English

  • Can You Hear Me Now? Improving Conversations between Security and ‘the Business'

    Wednesday15:40 - 16:3020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Your internal Security and Business teams have a common goal, but don't always speak the same language. This session reviews proven communication techniques, de...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • Next Gen Risk Assessment: Can it Save My Bacon Both with Regulators & in Litigation?

    Wednesday15:40 - 16:3020 Nov 2019
    Track 4: Security risk & compliance

    A discussion of the new Duty of Care Risk Assessment  methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discus...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • Back to Basics: The Fundamentals of Cyber Hygiene

    Wednesday16:50 - 17:2020 Nov 2019
    Spotlight Educational Sessions

    New innovations with cloud and IoT are changing the ways we use technology and how we secure it. No matter how technology changes there are still the basic thin...

    • Language: English

  • The Rising Tide of Privacy: Finding the Commonalities

    Wednesday16:50 - 17:2020 Nov 2019
    Spotlight Educational Sessions

    It all began with Europe's General Data Protection Regulation (GDPR). After that, a privacy tidal wave hit the United States with California first enacting a pr...

    • Language: English

  • Five Key Trends in Application Security

    Wednesday16:50 - 17:2020 Nov 2019
    Spotlight Educational Sessions

    Today’s hyper-connected businesses rely on a broad set of web, mobile, and API-based applications to connect customers, partners, and suppliers across the Inter...

    • Language: English

  • Optimize ITGC Testing by Automating User Access & Segregation of Duties Assessments

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    It’s time-consuming and repetitive to provide assurance over the effectiveness of IT controls. As the scope of IT assets expands to more cloud-based application...

    • Language: English

  • Addressing IT Security in an Evolving IT Industry

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    In this session, we'll discuss industry trends and how they are making it more challenging to manage and maintain a secure IT environment that's inclusive of bo...

    • Language: English

  • Staying in the Dark: How Intelligence Analysts are using Data, Context and Automation to Combat Cyber Threats

    Wednesday17:30 - 18:0020 Nov 2019
    Spotlight Educational Sessions

    The consequences of cybercrime originating from the dark web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percen...

    • Language: English

  • The Overlooked Risks of Cybersecurity Automation

    Thursday08:40 - 09:3021 Nov 2019
    Track 6: Industry Trends & Insights

    In this session, we will explore some of the most common implementations of automation for cybersecurity programs and the associated risks. We'll look at real-w...

    • Language: English

  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 09:3021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the draft Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • IoT Hacking for Beer

    Thursday09:30 - 10:1521 Nov 2019
    Geek Street

    IoT devices are available for every corner of our homes and workplaces. Numerous articles, studies, and exploits have been published on the security (or lack of...

    • Language: English

  • How to Communicate Your Risk & Security Program Value to Executives

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    Innovation Session Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives to...

    • Language: English

  • How to Use Your CAAT to Prevent Ghosting with One Snap

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Work smarter, not harder. With Robotic Process Automation (RPA) on the rise in the Audit industry, learn how Ally Financial has identified opportunities to auto...

    • Language: English

  • A New Strategy for Effective Cybersecurity Awareness Campaigns

    Thursday10:00 - 10:5021 Nov 2019
    Track 6: Industry Trends & Insights

    There are major forces at play attempting to exploit your weakest link – People. As networks become harder to breach, hackers are increasingly targeting staff a...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.