SecureWorldExpoDetroit 2014 Sept. 9, 2014 to Sept. 10, 2014, dearborn,usa

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Executive Advisory Board Breakfast: Recruiting & Retaining Cyber Talen Christopher Pierson N/A
Secure World Plus: Planning and Designing a Corporate Information Security Program Larry Wilson N/A
Check Point Software Technologies Ltd: Efficient Security Kierk Sanderlin N/A
Game Changer – Why You Can’t Afford to be Wrong About Risk Management Jane Harper N/A
Surviving an Audit Faith Heikkila N/A
We’re All in This Together: Turning Adversaries Into Allies Robert Keefer N/A
OPENING KEYNOTE: The Evolving Cybersecurity Threat Matrix and Legal Landscape Christopher Pierson N/A
Firemon: Highway Traffic Engineering: A Study in Proactive Security & Risk Management Ward Holloway N/A
Radware: Cyber War Chronicles: Stories From the Virtual Trenches David Hobbs N/A
SecureWorld Expo IT Security JeopardyClark R. Crain Tim Kennedy N/A
Selling Security to Management Thomas R. Peltier N/A
U.S. vs E.U. – A Privacy Cage Match Steven f. Fox N/A
LUNCH KEYNOTE: FishNet Security - Threat Intelligence: Friend of the Enterprise Danny Pickens N/A
Trend Micro: Stories of Malicious Code in action - APT to CryptoLocker Ken Donze N/A
Are We Insane? David Barton N/A
Better Monitoring Thru Threat Modeling & Exercise J wolfgang Goerlich N/A
Recorded Session: Spread Spectrum, Wireless Security & the World's Most Beautiful Geek John O'leary N/A
Roadmap for Success: 20 Critical Controls for Effective Cyber Defense Ken Evans N/A
Security Challenges of the Internet of Things and Big Data Barbara L. Ciaramitaro N/A
InfraGard Chapter Meeting Barry Hensley N/A
Business Impact Analysis on the Corporate R.A.D.A.R. Steven Aiello N/A
CyberArk: Locking Down the Admin Access to Block the Hacker & the Rogue David Kemp N/A
Finding the Balance: Privacy, Security & Freedom in a Connected World Melissa Markey N/A
Scan Your Networks Safely & Automatically – For Free Scott Aschenbach N/A
OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership Cedric Leighton N/A
Bit9: New World, New Realities: Endpoint Threat Detection, Response & Prevention for DUMMIES Brian Orr N/A
Cybersecurity Challenges and Practical Remedies in Healthcare Doug Copley N/A
Looking Ahead by Looking Back at Ten Years of Security Events Steven Hill N/A
Reinventing Cybersecurity Training Dan Lohrmann N/A
Radware - Surviving the Next Cyber War: Thingbots, the Cloud, & the Virtual Battlefield Carl Herberger N/A
RSA: Intelligence Driven Security Shane Harsch N/A
Defining the Field of Cybersecurity: The National Framework for Cybersecurity Work Dan Shoemaker N/A
Framework: The Difference Between Winning and Losing David Hawley N/A
Fruit and Fowl.. A Great Match Ed Morawski N/A