Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 22 results

|

Items per page:

Sort By
  • Key Insights Derived from Correlating NetFlow with Threat Intel Feeds

    Wednesday10:15 - 10:4014 Nov 2018
    Tech Talks

    Organizations in the most lucrative industries are seeking to quickly fortify their defenses by reducing the time required to identify and remediate threats. Is...

    • Language: English

  • AI & the Integration of Physical & Cybersecurity

    Wednesday10:50 - 11:1514 Nov 2018
    Tech Talks

    Rick Grinnell, Managing Partner of Glasswing Ventures, an early-stage venture capital firm investing in AI-powered technology companies that connect consumers a...

    • Language: English

  • The Industrialization of Red & Blue Teaming

    Wednesday11:25 - 11:5014 Nov 2018
    Tech Talks

    The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in security, leading to the industrializat...

    • Language: English

  • Quantifying Technology Risk in Dollars & Cents

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    Talking to our business partners about cybersecurity and technology risk is an ongoing challenge. The cost of security and Return on Investment (ROI) are always...

    • Language: English

  • Dispelling the Myth of the Cybersecurity Skills Shortage

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    While people like to claim there is a cybersecurity skills shortage, it is self-inflicted due to a lack of foresight to proactively identify people with related...

    • Language: English

  • How a Data Breach Can Benefit a Brand

    Wednesday12:35 - 13:0014 Nov 2018
    Tech Talks

    No company is safe from a data breach, but all companies can proactively plan for the inevitable. In fact, a data breach doesn’t have to be a brand damaging eve...

    • Language: English

  • Securing Nuclear Secrets Is Easy Compared to Healthcare

    Wednesday13:10 - 13:3514 Nov 2018
    Tech Talks

    A former information security manager for the US Navy’s submarine maintenance program discusses his experience in securing nuclear secrets, and how our nation’s...

    • Language: English

  • DevSecOps Awareness & A Guide to Practical Implementation

    Wednesday13:45 - 14:1014 Nov 2018
    Tech Talks

    In this discussion, we will focus on the challenges & threats, principles behind DevSecOps and Security Strategies to be incorporated into the Continuous Integr...

    • Language: English

  • Serverless Security: New World. New War.

    Wednesday14:20 - 14:4514 Nov 2018
    Tech Talks

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security chal...

    • Language: English

  • Remote Access Tools: The Hidden Threats Inside Your Network

    Wednesday14:55 - 15:2014 Nov 2018
    Tech Talks

    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are co...

    • Language: English

  • Making Intel Proactive: A Path to Move From Reacting to Threats to a Proactive Defense

    Wednesday15:30 - 15:5514 Nov 2018
    Tech Talks

    To outline an approach that gives you the speed of machines at the point of defense, the flexibility of humans at the pre-planning stage. Learning Outcomes: ...

    • Language: English

  • Securing Robots at Scale

    Wednesday16:05 - 16:3014 Nov 2018
    Tech Talks

    Robots are not only in industrial environments, they also exist in homes and around us as toys, companions, assistants and serve various roles in our daily live...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.