Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

25 - 36 of 77 results

|

Items per page:

Sort By
  • Protecting Sensitive Information From Insider & Outsider Threats

    Wednesday14:00 - 14:2514 Nov 2018
    Technology Showcase

    Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider (BAAs, sales representatives or othe...

    • Language: English

  • ISACA Workshop: Technical Versatility in Cybersecurity

    Wednesday14:00 - 16:0014 Nov 2018
    Workshops

    Gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner. Attendees will be led through four interactive on...

    • Language: English

  • Threat Modeling Workshop with Brook Schoenfield

    Wednesday14:00 - 15:0014 Nov 2018
    Workshops

    Threat modeling is all the rage in Paris, as well as everywhere throughout cyber security's reach. Until recently, though, threat modeling has been treated like...

    • Language: English

  • Finding & Keeping Talent: Building An Effective Cyber Security Team in a Highly Competitive Market

    Wednesday14:10 - 14:5014 Nov 2018
    Keynote Stage

    Quantifying the extent of the cyber skills shortage with in the industry and the investment required to find and keep talent Understanding what motivates tal...

    • Language: English

  • Serverless Security: New World. New War.

    Wednesday14:20 - 14:4514 Nov 2018
    Tech Talks

    Serverless applications have seen a significant rise in adoption in the past year. Along with its advantages, serverless architecture presents new security chal...

    • Language: English

  • New Regulations on the Block: Mitigating Today’s Complex Global Privacy Landscape

    Wednesday14:35 - 15:0014 Nov 2018
    Technology Showcase

    The EU’s General Data Protection Regulation (GDPR) changed the way people and businesses think about privacy with its extraterritorial scope and high fines. Sin...

    • Language: English

  • Remote Access Tools: The Hidden Threats Inside Your Network

    Wednesday14:55 - 15:2014 Nov 2018
    Tech Talks

    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are co...

    • Language: English

  • Kevin Mitnick Meet & Greet

    Wednesday15:00 - 16:0014 Nov 2018
    Special Events

    Want to meet the world's most famous hacker? Kevin Mitnick meet & greet is open to all Infosecurity North America attendees. When: Wednesday 14th November 3:00...

    • Language: English

  • Compromising the Hardware Supply Chain Management Workshop

    Wednesday15:00 - 16:0014 Nov 2018
    Workshops

    This presentation will describe the embedded system space and how to hack it. Learn from experts in reverse engineering hardware and where systems are vulnerabl...

    • Language: English

  • Supply Chain Risk Management Workshop

    Wednesday15:00 - 16:0014 Nov 2018
    Workshops

    This session will describe and demonstrate passive and active analysis of internet connected devices and systems. Learn how to obtain a security score of your b...

    • Language: English

  • Is DNS Part of Your Security Strategy?

    Wednesday15:10 - 15:3514 Nov 2018
    Technology Showcase

    DNS is everywhere. It has a front row seat to most malware activity and is increasingly abused as an attack vector by adversaries. DNS platforms are also a gold...

    • Language: English

  • Infosecurity North America Capture the Flag run by Security Innovation

    Wednesday15:30 - 19:0014 Nov 2018
    Workshops

    Location: C102/3

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.