SecureWorldExpoSeattle 2014 Nov. 12, 2014 to Nov. 13, 2014, Bellebue,USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Executive Advisory Board Breakfast: VIP / INVITE ONLY Chris Finan N/A
Secure World Plus: Planning and Designing a Corporate Information Security Program (SecureWorld Plus Registrants ONLY) Larry Wilson N/A
SecureWorld Plus: Risk Management as a Second Language - Security Speak for the C-Suite (SecureWorld Plus Registrants ONLY) Brian O'hara N/A
Akamai Technologies: Internet Security Threat Briefing Hans Cathcart N/A
Divided We Fall David Matthews N/A
RSA: Host & Network Visibility – A Combined View is Needed for Fighting Advanced Threats Jordan Gackowski N/A
ZixCorp: BYOD - A New Philosophy Neil Farquharson N/A
OPENING KEYNOTE: Government Cybersecurity 2015 - What to Expect From Congress and the Executive Branch in the Coming Year Chris Finan N/A
Anitian: Communicating Risk to Executive Leadership Andrew Plato N/A
CTIN: Preparing for Windows Next: Researching the Forensics Implication of a New Operating System Troy Larson N/A
Juniper Networks: Physical, Virtual, Data Center and Counter Security The world is a Zoo – How to Defend Your Online Presence John Somm N/A
Radware: Cyber War Chronicles: Stories From the Virtual Trenches David Hobbs N/A
Threat Intelligence Data Sharing – A 360 Degree View From Industry & Law Enforcement Craig Spiezle , Tim Wallach N/A
LUNCH KEYNOTE: FishNet Security - Security in a Cloudy Environment Jeff Doyle N/A
Accuvant: Zero to 60 – How to Build a Threat Intelligence Capability Jason Clark N/A
HP: Stop Looking for the Silver Bullet, Start Thinking Like a Bad Guy Eric Schou N/A
Moving to the Cloud: How to Be Secure Frank Simorjay N/A
Webroot: Predictive Threat Intelligence - Connecting the Dots to Identify Unknown Threats Before They Attack Chris Jacobs N/A
Are We Insane? David Barton N/A
FireMon: 5 Myths of Data Breaches Omar Reyes N/A
InfraGard Chapter Meeting: Presenting the New Tool "Malware Investigator" - Open to All Attendees Jon Burns N/A
Palo Alto Networks: Traps – Advanced Endpoint Protection, The Harsh Reality Garrett Hamilton N/A
Why We Keep Building Unsecure Systems Peter Gregory N/A
OPENING KEYNOTE: The Truth About Cybersecurity Robert Bigman N/A
Bit9: New World, New Realities: Endpoint Threat Detection, Response & Prevention for DUMMIES Harry Sverdlove N/A
Bromium: Security & Privacy for an Era of Cloud & Mobility Simon Crosby N/A
Layered Malware Protection Nichole Olson N/A
PhishMe: Evolution of a Phish That Got Through the Net[work] Allan Carey N/A
Security Considerations for the Internet of Things Eduard Telders N/A
Lunch Keynote: Radware - Surviving the Next Cyber War: Thingbots, the Cloud, & the Virtual Battlefield Carl Herberger N/A
FireEye: Is My Company Being Targeted? 5 Quick Ways to Find Out Kevin Thompson N/A
Qualys: Integrating Web Application Scanning Best Practices Within the SDLC Frank Catucci N/A
AvePoint: Balancing Transparency & Privacy - Best Practices to Protect Your Sensitive Data John Peluso N/A
Cybersecurity Defense Update Kevin Murphy N/A
Embedded Mobile Device Security For Smartphones & Tablet PCs Karl Weaver N/A