NYMJCSC 2016 Oct. 5, 2016 to Oct. 5, 2016, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Nicholas J. Percoco , Larry Clinton President and Chief Executive Officer, Internet Security Alliance Larry Clinton is President and CEO of ...
Turning Hackers’ Gold – Data – into Straw Cindy Cullen Data has become king in the enterprise. As organizations are in an “arms race” to ...
Look mom! No vulns!”: Attacking Smart Systems By Faking Signals, No 0-Days Required. Michael Shalyt As the world becomes increasingly Smart, we rely more and more on remote sensor data ...
Using Data Intelligence to Separate Fact from Fiction on the Dark Web Danny Rogers Much myth surrounds the dark web. In fact, even defining it is a challenge, as ...
Introduction to Malware Analysis - 0 to 60 in Under an Hour Lenny Zeltser Knowing how to analyze malware has become a critical skill for incident responders and other ...
Cloud Security vs On-Premises Security What's better, what's different Dan Stolts Often technology and even security professionals approach security of their entire infrastructure in the same ...
Software Supply Chain Management: Enabling Enterprise Resilience and Cybersecurity Assurance Joe Jarzombek As the cyber threat landscape evolves and as software dependencies grow more complex, understanding and ...
What the Security Professional Needs to Know about Cryptography William Hugh Murray This presentation will cover those things which security practitioners need to know about cryptography that ...
The *Vulnerability* Response Program – Responding to attacks that haven’t even happened yet Jeff Williams You probably have an incident response program in place, but do you have a *vulnerability* ...
Why The Cloud Is About To Become The Most Secure Storage Platform in History Paul g. Lewis How Secure is the Cloud? It is about to become the most secure storage platform ...
Improving The Security of Your Organization via Mock Malware Incidents Christopher Frenz An all too common headline is becoming “business held for ransom” as organizations begin to ...
Access Control Lists so 1900’s Let us move past the 1980’s technology Jay Ferron We’ve been using Access control to protect data for years, but it’s just not working ...
Meet Hal, My New AI Intelligent Automated Incident Responder Paul Ferrillo Meet Hal, my new AI-intelligent cyber security incident responder. Yes, AI-Intelligent Automated Incident Responder. Responding ...
Measuring the Cybersecurity of Software Lev Lesokhin Recent security breaches such as the ones at SWIFT and Target are entering the realm ...
Deep, Fast & Strong: IAST & RASP for Techies – Understanding How Runtime Analysis Actually Works! Ofer Maor IAST (& RASP) are revolutionary technologies, which are starting to get traction in the market. ...
The Real Final Frontier - Defending the Human Kenneth Newman Talk will present relevant research on why most cyber security awareness efforts fail and what ...
Red Teaming the C-Suite--The Ultimate InfoSec Awareness Program Thomas Stephenson The sad truth is Cybersecurity Awareness Programs can be stale, boring and ineffective leaving many ...