Conference Program


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


1 - 12 of 15 results


Items per page:

Sort By
  • Key Insights Derived from Correlating NetFlow with Threat Intel Feeds

    Wednesday10:15 - 10:4014 Nov 2018
    Tech Talks

    Organizations in the most lucrative industries are seeking to quickly fortify their defenses by reducing the time required to identify and remediate threats. Is...

    • Language: English

  • The Industrialization of Red & Blue Teaming

    Wednesday11:25 - 11:5014 Nov 2018
    Tech Talks

    The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in security, leading to the industrializat...

    • Language: English

  • Quantifying Technology Risk in Dollars & Cents

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    Talking to our business partners about cybersecurity and technology risk is an ongoing challenge. The cost of security and Return on Investment (ROI) are always...

    • Language: English

  • DevSecOps Awareness & A Guide to Practical Implementation

    Wednesday13:45 - 14:1014 Nov 2018
    Tech Talks

    In this discussion, we will focus on the challenges & threats, principles behind DevSecOps and Security Strategies to be incorporated into the Continuous Integr...

    • Language: English

  • Remote Access Tools: The Hidden Threats Inside Your Network

    Wednesday14:55 - 15:2014 Nov 2018
    Tech Talks

    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are co...

    • Language: English

  • The Secure Internet Gateway: Security Reimagined in the Cloud

    Wednesday15:45 - 16:1014 Nov 2018
    Technology Showcase

    As your applications and data move to the cloud, you need to ensure your security stack extends there, too. Attend this session to learn how Cisco is challengin...

    • Language: English

  • Securing Robots at Scale

    Wednesday16:05 - 16:3014 Nov 2018
    Tech Talks

    Robots are not only in industrial environments, they also exist in homes and around us as toys, companions, assistants and serve various roles in our daily live...

    • Language: English

  • Cyber Attacks Are Real: Protect Your Endpoints

    Wednesday16:20 - 16:4514 Nov 2018
    Technology Showcase

    Endpoint updates are more complex and challenging with the proliferation of devices. Each device increases the number of threats from malware and viruses. Consi...

    • Language: English

  • Anatomy of a Nation-State Attack

    Thursday12:35 - 13:0015 Nov 2018
    Tech Talks

    Ever wanted to learn how advanced attackers gain foothold within an organization’s network? Learn their tactics, techniques and procedures (TTPs) on a real-life...

    • Language: English

  • The Incident Responder & the 6 month APT: Insight into Adversary Operator Behavior

    Thursday12:50 - 13:1515 Nov 2018
    Technology Showcase

    During a prolonged incident response contract with a customer, mnemonic was able to study an APT actor closely over a time span of six months. During this talk ...

    • Language: English

  • Autonomous Cyber Defense: AI and the Immune System Approach

    Thursday13:25 - 13:5015 Nov 2018
    Technology Showcase

    Legacy approaches to cybersecurity, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks. Self-learning systems re...

    • Language: English

  • Crouching Miner, Hidden Exfil

    Thursday13:45 - 14:1015 Nov 2018
    Tech Talks

    Everyone is aware of the idea of alert fatigue and the unfortunate reality of overworked and undertrained analysts.  What happens when attackers start to focus ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.