SecureWorldExpoStLouis 2014 Sept. 23, 2014 to Sept. 24, 2014, st louis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Executive Advisory Board Breakfast: "Benchmarking" VIP / INVITE ONLY Larry Ponemon Join Dr. Larry Ponemon for an Executive Advisory Board Breakfast and discussion: VIP / INVITE ...
ISSA Chapter Meeting: Internet of Things Presentation James Cabe Join ISSA for a chapter meeting and guest speaker James Cabe from Fortinet speaking on ...
Secure World Plus: Planning and Designing a Corporate Information Security Program (SecureWorld Plus Registrants ONLY) Larry Wilson his class is for SecureWorld Plus Registrants ONLY. This class will cover the essential elements ...
How to Communicate with Legal: a BYOD Case Study Patrick Chavez Enterprise security requires cooperation between IS and Legal, but many times that cooperation never materializes ...
Phishing: A Direct Deposit to the Criminal World Brian Allen In the fall of 2013, Washington University in St. Louis was hit with a phishing ...
OPENING KEYNOTE: How Does Your Security Program Stack Up Against the Competition Larry Ponemon For more than a decade, Ponemon Institute has benchmarked the emerging role of the CISO ...
Panel: What does the NIST Cyber Security Framework Mean to Industry? Ralph Johnson President Obama's Executive Order - Improving Critical Infrastructure Cybersecurity - has been the hottest topic ...
Radware: Cyber War Chronicles: Stories From the Virtual Trenches David Hobbs Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect ...
Recorded Session: Spread Spectrum, Wireless Security & the World's Most Beautiful Geek John O'leary Note: This is a previously recorded session. In her movies and interviews, she never sounded ...
Security Auditing: Audit Once - Report ManyAudrey Katcher Randall Hahn From regulators, to customers, to business partners, IT security is subject to numerous audits all ...
Lunch Keynote: Radware - Surviving the Next Cyber War: Thingbots, the Cloud, & the Virtual Battlefield Carl Herberger Security professionals could be forgiven for feeling that they are fighting a losing battle. As ...
Key Aspects of a Cybersecurity Program Larry Wilson Please join Larry Wilson; Information Security Lead for the University of Massachusetts to discuss some ...
Breach Happens Kevin Hardcastle It is no longer a matter of if a breach will happen, but when. This ...
Risk Assessments – From the Beginning Leslie Hall Why, when and how to conduct risk assessments. This session will cover key components and ...
The Problem with P@ssw0rd5: Improving Authentication Christopher Byrd Passwords have been at the center of many recent breaches from private celebrity photo leaks ...
InfraGard Chapter Meeting: Threat Hunting is Not a Hobby Ken Karasek Chapter Meeting with Speaker Ken Karasek The security posture that companies have adopted has been ...
Eight Secure Web Browsers Evaluated David Strom The Web browser has been a major infection vector for years, allowing megabytes of malware ...
The Illusion of Security: Low-tech Threats vs. High-tech Solutions Jim Sharp We live in a world of constantly-evolving vulnerabilities, both new and not-so-new. Whether it’s Mother ...
OPENING KEYNOTE: Gaining Visibility, Meaningful Information Security and Fraud Data in Seconds Demetrios Lazarikos A big data case study on using a risk-based approach for Information Security and Fraud ...
Governance, Risk and Compliance (or Controls) – The Quest Crystal Dees Are you on the quest for GRC knowledge? Do you feel like you are all ...
The Art of the Cyber War Joseph Meister Join a discussion on the Art of Cyber War. Thoughts on responding to the Cyber ...
Washington University in St. Louis leads Security Training & Education Johnnie Foster , Jack Zaloudek Johnnie Foster, Director of CAIT and Jack Zaloudek, Director of Information Management, Cyber Security Management ...
KEYNOTE: Driving Risk Management – Rules of the Road Mike Gibbons We all need to manage risk while demonstrating to auditors that our systems are worthy ...
Proactive Security Measures on a Budget Randy Raw We will look at some free and low cost ways to implement security controls that ...
Risk Management – The life and crimes of Security Christine Wanta Review of the top five criteria for any ‘best’ solution where risk is identified. Christine ...