Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 17 results

|

Items per page:

Sort By
  • Lord Admiral Nelson and the Dawn of Identity

    Wednesday10:30 - 10:5514 Nov 2018
    Technology Showcase

    Admiral Nelson's innovative use of identity in his strategy at the Battle of Trafalgar provides the foundation for identity to play the key role in any security...

    • Language: English

  • Dispelling the Myth of the Cybersecurity Skills Shortage

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    While people like to claim there is a cybersecurity skills shortage, it is self-inflicted due to a lack of foresight to proactively identify people with related...

    • Language: English

  • Securing Nuclear Secrets Is Easy Compared to Healthcare

    Wednesday13:10 - 13:3514 Nov 2018
    Tech Talks

    A former information security manager for the US Navy’s submarine maintenance program discusses his experience in securing nuclear secrets, and how our nation’s...

    • Language: English

  • Security in the Cloud: Developing an Effective Governance Strategy for the Evolving Cloud Environment

    Wednesday13:20 - 14:0014 Nov 2018
    Keynote Stage

    Quantifying the new security risk of increasingly agile, digitalized businesses using SAAS, IAAS and BYOD Understanding the data protection, operational and ...

    • Language: English

  • DevSecOps Awareness & A Guide to Practical Implementation

    Wednesday13:45 - 14:1014 Nov 2018
    Tech Talks

    In this discussion, we will focus on the challenges & threats, principles behind DevSecOps and Security Strategies to be incorporated into the Continuous Integr...

    • Language: English

  • Serverless Security: New World. New War.

    Wednesday14:20 - 14:4514 Nov 2018
    Tech Talks

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security chal...

    • Language: English

  • New Regulations on the Block: Mitigating Today’s Complex Global Privacy Landscape

    Wednesday14:35 - 15:0014 Nov 2018
    Technology Showcase

    The EU’s General Data Protection Regulation (GDPR) changed the way people and businesses think about privacy with its extraterritorial scope and high fines. Sin...

    • Language: English

  • Securing Robots at Scale

    Wednesday16:05 - 16:3014 Nov 2018
    Tech Talks

    Robots are not only in industrial environments, they also exist in homes and around us as toys, companions, assistants and serve various roles in our daily live...

    • Language: English

  • Developing an Innovative Cyber Defense Approach

    Thursday10:20 - 10:4015 Nov 2018
    Keynote Stage

    Opening keynote presentation NSA's Cybersecurity Operations Center (NCTOC) has one of the largest 24*7*365 presences across the US Government, as they defend o...

    • Language: English

  • From GDPR to California Privacy: Managing Cloud Vendor Risk

    Thursday10:45 - 11:1515 Nov 2018
    CSA Summit

    Managing vendor risk is a continuous effort under GDPR, California CCPA and other global regulations. As organizations continue to improve their privacy and sec...

    • Language: English

  • Regulation Special Focus: Keeping up with Compliance

    Thursday10:50 - 11:5015 Nov 2018
    Keynote Stage

    During this extended session expert speakers will share their perspectives on how to ensure your organization keeps up with increased regulatory oversight. The ...

    • Language: English

  • Lessons from the Vault: How Micro-Segmentation Protects Your Data Center’s Precious Jewels

    Thursday11:25 - 11:5015 Nov 2018
    Tech Talks

    What links one of the world’s largest jewelry thefts and data center security?  The theft was possible because there was no security within the safe deposit vau...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.