CornerstonesofTrust 2016 June 14, 2016 to June 14, 2016, san francisco,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Afternoon Keynote Panel: Personal Privacy vs Legal Access Shahid Buttar , Jack Bennett , Mark Divner , Edward Kraus N/A
Advanced Persistent Security to Fight Advanced, and Not So Advanced, Persistent Threats Ira Winkler , Araceli Treu Gomes It appears that any successful attack these days is labeled, Sophisticated. The implication is that ...
Just Secure What? Jack Jones Because securing everything, all the time, to the maximum extent, isn’t feasible, it becomes crucial ...
Factor Analysis of Information Risk (FAIR) framework Training Mike Jerbic We’ve all heard this: Risk is everywhere. Everything is a risk. No risk, no reward. ...
Breaking Honeypots for Fun and Profit Dean Sysman Abstract: We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the ...
How improved IR Strategies combined with Advanced Endpoint and Network Protection can Enhance Your Security Environment Araceli Tre Gomes Abstract: Today's threats are nearly always new and never before seen. Today's attacks are often ...
Do AppSec Shortcuts exist? Derek Chowaniec Abstract: As enterprises shift to continuous delivery and other DevOps innovations, the pressure is mounting ...
Amazon Web Services (AWS) Security, a Primer Anshu Gupta Abstract: As more and more organizations adopt Amazon Web Services (AWS) as their infrastructure (IaaS) ...
Logically Securing a Public Cloud Service Tim Mather Abstract: Cloud computing is fundamentally differently than other computing models. With cloud computing, data separation ...
Digital Certificates: Today’s Doomsday Defense – An In-Depth Look at the History and Evolution of PKI and its Ever Increasing Role in the Emergence of the IoT Ted Heiman Abstract: I was told by a colleague of mine several years back that PKI is ...
Personal Reflections on the Past, Present, and Future of Cybersecurity Peter Neuman Sr. Principal Scientist, SRI International, Computer Science Laboratory This is intended to be an open-ended ...
Lessons from the Human Immune System Allen Marin Abstract: All signs point to a future world of more complex, harder to detect cyber ...
The Road to Hiring is Paved in Good Intentions Tim O'brien Abstract: Everyone is complaining there is no one to hire, they cannot find qualified candidates, ...
The Data Protection Imperative Michelle Fleury Abstract: The proliferation of networked devices is bringing tremendous opportunity to business and consumers alike. ...
We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat? Roy Katmor Abstract: Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. ...
Web Security for Dummies Lee Neely Abstract: Today's web surfing experience is more riddled with landmines than ever, which results in ...
Securing the Supply Chain: Best Practices when Evaluating Third Party Technology Acquisition Stuart Cianos Abstract: Now more than ever, it's important to have an understanding of the risks related ...
Best Legal and Security Practices for BYOD Lawrence Dietz Abstract: BYOD is causing a tsunami of issues for enterprises. Employees, clients, suppliers and others ...
Gaining Visibility from the Security Stack: Leveraging APIs and Integrations to Get More Out of Your Investment Rob Fry N/A