Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 24 results

|

Items per page:

Sort By
  • Quantifying Technology Risk in Dollars & Cents

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    Talking to our business partners about cybersecurity and technology risk is an ongoing challenge. The cost of security and Return on Investment (ROI) are always...

    • Language: English

  • How a Data Breach Can Benefit a Brand

    Wednesday12:35 - 13:0014 Nov 2018
    Tech Talks

    No company is safe from a data breach, but all companies can proactively plan for the inevitable. In fact, a data breach doesn’t have to be a brand damaging eve...

    • Language: English

  • Securing Nuclear Secrets Is Easy Compared to Healthcare

    Wednesday13:10 - 13:3514 Nov 2018
    Tech Talks

    A former information security manager for the US Navy’s submarine maintenance program discusses his experience in securing nuclear secrets, and how our nation’s...

    • Language: English

  • The Importance of Threat Intelligence Management

    Wednesday13:25 - 13:5014 Nov 2018
    Technology Showcase

    The Importance of threat intelligence management will help attendees understand what it means to fully manage threat intelligence. The session will include how ...

    • Language: English

  • DevSecOps Awareness & A Guide to Practical Implementation

    Wednesday13:45 - 14:1014 Nov 2018
    Tech Talks

    In this discussion, we will focus on the challenges & threats, principles behind DevSecOps and Security Strategies to be incorporated into the Continuous Integr...

    • Language: English

  • Protecting Sensitive Information From Insider & Outsider Threats

    Wednesday14:00 - 14:2514 Nov 2018
    Technology Showcase

    Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider (BAAs, sales representatives or othe...

    • Language: English

  • New Regulations on the Block: Mitigating Today’s Complex Global Privacy Landscape

    Wednesday14:35 - 15:0014 Nov 2018
    Technology Showcase

    The EU’s General Data Protection Regulation (GDPR) changed the way people and businesses think about privacy with its extraterritorial scope and high fines. Sin...

    • Language: English

  • Remote Access Tools: The Hidden Threats Inside Your Network

    Wednesday14:55 - 15:2014 Nov 2018
    Tech Talks

    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are co...

    • Language: English

  • Is DNS Part of Your Security Strategy?

    Wednesday15:10 - 15:3514 Nov 2018
    Technology Showcase

    DNS is everywhere. It has a front row seat to most malware activity and is increasingly abused as an attack vector by adversaries. DNS platforms are also a gold...

    • Language: English

  • Making Intel Proactive: A Path to Move From Reacting to Threats to a Proactive Defense

    Wednesday15:30 - 15:5514 Nov 2018
    Tech Talks

    To outline an approach that gives you the speed of machines at the point of defense, the flexibility of humans at the pre-planning stage. Learning Outcomes: ...

    • Language: English

  • Securing Robots at Scale

    Wednesday16:05 - 16:3014 Nov 2018
    Tech Talks

    Robots are not only in industrial environments, they also exist in homes and around us as toys, companions, assistants and serve various roles in our daily live...

    • Language: English

  • Cyber Attacks Are Real: Protect Your Endpoints

    Wednesday16:20 - 16:4514 Nov 2018
    Technology Showcase

    Endpoint updates are more complex and challenging with the proliferation of devices. Each device increases the number of threats from malware and viruses. Consi...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.