Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 53 of 53 results

|

Items per page:

Sort By
  • Take a Ride on the Dark Side: Data on the Dark Web

    Wednesday10:00 - 10:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Not many days go by without hearing about a new breach releasing data of hundreds, thousands and sometimes millions of people. What happens with that data? How ...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Hacking to Teach Cyber Awareness in an Organization

    Wednesday10:00 - 10:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Using hacking tools and tactics to make an impact on your organizations culture about security awareness. How real life examples and hacking use cases of cowork...

    • Language: English

  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Dark Web Review: A Deep Dive into a Dark World

    Wednesday10:00 - 10:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    In this uncensored view of the Dark Web and Hackers we will see how their systems function, and what we can do to stop them. From botnets, to financial scams we...

    • Language: English

  • The Collision Course Between Big Data & AI, Privacy, Ethics & Regulations in the AI + IoT World

    Wednesday11:00 - 11:5020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will explore how GDPR is a great blueprint, why tighter data-retention policies are needed, the pressures of effective AI and IoT, and then assess both sides...

    • Language: English

  • Illuminating the CISO’s ICS Blind Spot

    Wednesday11:00 - 11:5020 Nov 2019
    Track 4: Security risk & compliance

    As most organizations today utilize Operational Technology (OT) devices, which are more vulnerable to cyber threats, the CISO better be involved with OT securit...

    • Language: English

  • Cyber Leadership in an Ecosystem Context

    Wednesday11:00 - 11:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Cyber leaders are ill-prepared for the enormity of their task. It’s now about rallying disparate teams across a sprawling ecosystem and applying highly-nuanced ...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Using Cloud Access Security Brokers to Stop SaaS Data Leaks

    Wednesday11:00 - 11:5020 Nov 2019
    Track 1: Emerging security tools & techniques

    Shadow IT. Unsanctioned vs. Sanctioned Apps. SaaS provides flexibility & agility, but not without risk. Enter CASB – a means to control SaaS usage, sensitive da...

    • Language: English

  • Leveraging Behavioral Analytics to Strengthen Internal Controls

    Wednesday13:20 - 14:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    User Behavior Analytics is an enhanced technique using machine learning and AI to identify potential control weakness, potential threats and underlying process ...

    • Language: English

  • How to Articulate the Value of Information Security to Senior Management?

    Wednesday13:20 - 14:1020 Nov 2019
    Track 4: Security risk & compliance

    One of the major challenges is presenting IS value or the return on security investment (ROSI). This session aims to provide elements allowing CISOs to design a...

    • Language: English

  • Bat Cave to Board Room, Selling Technology Solutions to Upper Management

    Wednesday13:20 - 14:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Good technology employees can see needs and develop solutions; great ones can transfer this knowledge to others.  During this session we will focus on the soft ...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • DNS: A Phishing Chokepoint

    Wednesday13:20 - 14:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    As with many types of abuse, DNS plays a pivotal role in the enablement of phishing. We explore a way to find phishing domains with open source intel, without h...

    • Language: English

  • Effective Key Steps into Digital Forensics & Incident Response (DFIR)

    Wednesday14:20 - 15:1020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Key steps and highlights you need to be aware of while handling real cyber incidents After this session you will be able to: Better prepare for cyber inciden...

    • Language: English

  • Implementing a Cybersecurity Skills Competencies Framework

    Wednesday14:20 - 15:1020 Nov 2019
    Track 3: Cybersecurity leadership & development

    The session will provide an insight, based on recent practical experience, into tools that can be used to implement a skills competencies framework & the suppor...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Exposing the Dark Overlord: Using OSINT to Identify a Group of Modern-Day Cyber Terrorists

    Wednesday14:20 - 15:1020 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk focuses on exploring the OSINT tools, investigative thought process, and collection of dark web data that led to the identification of The Dark Overlo...

    • Language: English

  • Making Cents of Maturity: Building Resistive Strength

    Wednesday14:40 - 15:1020 Nov 2019
    Track 4: Security risk & compliance

    Users will be engulfed in the land of cyber security controls in relation to GRC. Using a quantitative analysis framework, FAIR the program prioritizes controls...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • Next Gen Risk Assessment: Can it Save My Bacon Both with Regulators & in Litigation?

    Wednesday15:40 - 16:3020 Nov 2019
    Track 4: Security risk & compliance

    A discussion of the new Duty of Care Risk Assessment  methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discus...

    • Language: English

  • Privacy & Ethics are the Headlines: How Does a Business Leader Cope & Capitalize

    Wednesday15:40 - 16:3020 Nov 2019
    Track 3: Cybersecurity leadership & development

    For enterprise security leaders, an amazing opportunity to treat the consumer as an informed partner using privacy and ethics as a competitive differentiator Af...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

  • The New Security Frontier: AI, Threat Hunting, Behavioral Anomalies, & Automated Response

    Wednesday15:40 - 16:3020 Nov 2019
    Track 1: Emerging security tools & techniques

    New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and ...

    • Language: English

  • Information Governance: The Foundation for Information Security

    Thursday08:40 - 09:3021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Information governance is essential for effective information security.  Deleting redundant, obsolete, and trivial data through retention and rule enforcement w...

    • Language: English

  • Risk Informed Privacy Management: The NIST Privacy Framework

    Thursday08:40 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    NIST recently released the Privacy Framework to help organizations manage risk imposed by holding and processing privacy data. This session shares lessons learn...

    • Language: English

  • Auditing with SOC-CMM: Cybersecurity Detection & Incident Response

    Thursday08:40 - 09:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    SOC-CMM is maturity and capability model for evaluation of Security Operation Centers (SOCs). Speaker will share field experiences how to apply the model for au...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • End-to-End Injection Safety at Scale

    Thursday08:40 - 09:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    Trusted types bakes lessons learned by Google Security into the browser.  Learn how small tool changes enable organizational factors that ease development of se...

    • Language: English

  • Data Governance in the Analytics & Privacy Driven Era

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    With rapid rise in data-driven business models, there is an increasing need to harness the power of analytics while protecting privacy. Session will focus on ho...

    • Language: English

  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • Dynamic Information Security in a Static Organizational Culture

    Thursday10:00 - 10:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The presentation will discuss the need for static organizational cultures to become more flexible in meeting the demands of a dynamic information security frame...

    • Language: English

  • Offensive Threat Models Against the Supply Chain

    Thursday10:00 - 10:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    This presentation focuses on applying a more adversarial threat model to supply chain systems that are integrated into client environments. After this session y...

    • Language: English

  • Death by Automation: Accelerating Your SOC Using Open Source Tools

    Thursday10:00 - 10:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    The intent of the session would be to call out specifics around the process and technology that could be adopted to detect advanced threats and to respond to th...

    • Language: English

  • Statistical Analysis of Network Exposure

    Thursday11:00 - 11:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    We will present an analysis of network traffic of 6 real-world networks to show how vastly overexposed systems and applications are in today’s computing environ...

    • Language: English

  • Crypto-Agility: Responding Quickly to Cybersecurity Events

    Thursday11:00 - 11:5021 Nov 2019
    Track 4: Security risk & compliance

    Organizations rely heavily on TLS and other encryption protocols to protect data. Yet, most are at risk because they don’t maintain crypto-agility. Learn the th...

    • Language: English

  • CPE Credits Helping to Massively Scale up the Next Generation of Cyber Professionals

    Thursday11:00 - 11:5021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Accelerating a diverse talent pipeline into the Profession, while earning CPE credits. ISACA-NYM members are mentoring students through virtual-internships to m...

    • Language: English

  • Multidimensional Attack Path Analysis: Eliminating Network Blind Spots

    Thursday11:00 - 11:5021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    What happens when you change your view of what matters on your network? Understanding how attackers use low friction pathways helps you prioritize what to prote...

    • Language: English

  • Continuous Fuzzing: The Trending Security Technique Among Silicon Valley’s Tech Behemoths

    Thursday11:00 - 11:5021 Nov 2019
    Track 1: Emerging security tools & techniques

    Continuous fuzzing has become a hot security trend among tech behemoths like Google, Microsoft, and more. Dr. David Brumley will share his research on the syner...

    • Language: English

  • From Heist to Hostage Situation: The Rise of the Modern Bank Robbery

    Thursday13:20 - 14:1021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    With increases in destructive cyber-attacks and counter incident response, bank robberies in cyberspace are closer to hostage situations than heists. Tom will d...

    • Language: English

  • Using NIST Frameworks with COBIT 2019

    Thursday13:20 - 14:1021 Nov 2019
    Track 4: Security risk & compliance

    Learn about new processes for combining the benefits of NIST’s risk-based information security frameworks and ISACA’s updated COBIT 2019. After this session you...

    • Language: English

  • A New Employer-Driven Model of Cyber Workforce Development For Dell

    Thursday13:20 - 14:1021 Nov 2019
    Track 3: Cybersecurity leadership & development

    The cyber training landscape produces over-credentialed, yet under-qualified, candidates, while employers lack clearly defined roles. We examine how job role an...

    • Language: English

  • 5G Security: New Vulnerabilities, New Solutions

    Thursday13:20 - 14:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    5G will expose new vulnerabilities - new radio technologies, dynamic provisioning, virtualization, and automated orchestration - requiring new information secur...

    • Language: English

  • Authorization Using Attributes

    Thursday13:20 - 14:1021 Nov 2019
    Track 1: Emerging security tools & techniques

    Most IAM Solutions focus on authentication which is a critical component of information security. Our discussion will be about authorization, specifically what ...

    • Language: English

  • Security Risks Your Auditors Care About in a Cloud Native & DevOps World

    Thursday14:20 - 15:1021 Nov 2019
    Track 4: Security risk & compliance

    APIs, Containers, automated pipelines, and DevOps - oh my! Software delivery is changing, and the risks and audit considerations are changing too. You'll hear a...

    • Language: English

  • The ROI of Information Security Teams

    Thursday14:20 - 15:1021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Many organizations have no clear cut roles for their InfoSec teams. As such there is redundancy in the roles and the teams do not perform to the optimal best. W...

    • Language: English

  • Using Passive DNS to Strengthen Incident Investigation & Response

    Thursday14:20 - 15:1021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Passive DNS can provide you with insight you normally don't have. In this session we explain what Passive DNS is, what it can do and how you can do it. After th...

    • Language: English

  • Assessing Integrated Risk Intelligently

    Thursday14:20 - 15:1021 Nov 2019
    Track 1: Emerging security tools & techniques

    This talk will introduce and demonstrate a new approach for categorizing and measuring integrated risk in complex organizations. Based on rigorous research cond...

    • Language: English

  • Enterprise IT Governance and DevSecOps: A Grounded Theory Literature Review

    Thursday15:40 - 16:3021 Nov 2019
    Track 4: Security risk & compliance

    The new approach driving continuous integration, deployment and security in short release cycles – DevSecOps – is challenging established enterprise IT governan...

    • Language: English

  • Security Key Point Indicators or "How to Measure Security from the Governance Perspective"

    Thursday15:40 - 16:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    Having reliable indicators is imperative to be able to assess risks and develop reliable reports for IS decision-making bodies. This session aims to provide ele...

    • Language: English

  • Using the Distributed Vulnerability Assessment to Improve the Security Level

    Thursday15:40 - 16:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    For measuring the security level of an infrastructure, the DVA model use the following parameters: 1 cyber-threat properties; 2 information of IT elements; 3 us...

    • Language: English

  • Modernize Your Incident Response Program for the Cloud

    Thursday15:40 - 16:3021 Nov 2019
    Track 1: Emerging security tools & techniques

    This session will focus on real life processes to manage an efficient incident response lifecycle in modern cloud world. Additionally, we cover how to prioritiz...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.