Title |
Speakers |
Summary |
Topic Types |
Morning Security Briefing with the U.S. Department of Justice |
Sean Newell
|
N/A |
|
Morning Keynote with root9B: The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk. |
Eric Stride
|
The number one technique used by attackers in a data breach is leveraging weak or ... |
|
root9B Roundtable Discussion: HUNT: Securing the Commercial Sector Since 2013 |
David Aucsmith
,
Eric Stride
|
The current approach of cybersecurity is not working. This has been made abundantly clear by ... |
|
CenturyLink Presentation: Cutting Through the Noise – Moving Your Security Program and Organization to the Offense |
Bill Swearingen
|
Join the region’s leading executives, and cybersecurity leaders as they share current and next generation ... |
|
PANEL 1: The Compliance Nightmare: Using Your Solution Provider as a GPS For Navigating The Perilous Road To Compliance |
Bill Swearingen
,
Daniel Garrie
,
Daniel Clayton
,
Ian Gorrie
|
The guidelines that influence your organization’s cybersecurity policies can come from a multitude of fronts: ... |
|
Roundtable Discussion: You’re Breached! Hacking Back & Its Legal Repercussions. What’s Your Strategic Incident Response Plan? |
Daniel Garrie
|
N/A |
|
Darktrace Roundtable Discussion: The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks |
Andrew Tsonchev
|
N/A |
|
PANEL 2: What Emerging Risks Are Likely To Become Major Threats Facing IoT and Big Data? What New Countermeasures & Cutting Edge Technologies Are Available For Defense? |
David Aucsmith
,
Paul Fletcher
,
Karl Gainey
,
Alex Kaplunov
|
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few ... |
|