RMISC 2015 May 12, 2015 to May 13, 2015, Colorado,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CYBER WARFARE TRAINING AND THREAT SIMULATION (PRESENTED BY BLACKFIN SECURITY) Alex Mccormack N/A
EMERGING ISSUES IN IT AUDITING (PRESENTED BY DELOITTE) Clayton Smith , Rhonda Willert N/A
INTRODUCTION TO MALWARE ANALYSIS (PRESENTED BY KORELOGIC SECURITY) Tyler Hudak N/A
OPEN FAIR TRAINING (PRESENTED BY CXOWARE AND THE OPEN GROUP) Chad Weinman , Jim Hietala N/A
SECURITY LEADERSHIP ROUNDTABLE (PRESENTED BY E&Y) Anil Markose , Ashley Devoto , Matthew Randolph N/A
#101: THE QUANTITATIVE RISK MANAGEMENT PROCESS John Overbaugh N/A
#102: RESCUE YOUR ANALYTICS FROM (UN) CERTAIN DOOM Urban Martin N/A
#103: THE INCEPTION FRAMEWORK: CLOUD BASED TARGETED ATTACK INFRASTRUCTURE Waylon Grange N/A
#104: CYBER PLAGUES: AN APPROACH TO NEW THREATS Jack Callaghan N/A
#105: LEARNING TO WALK, AGAIN Steve f. Fox N/A
#106: WINDOWS POWERSHELL FOR THE POWER AUDITOR Chad Stowe , Brian Cather N/A
#107: THREAT PREVENTION USING MACHINE LEARNING, CONTEXTUALIZATION AND PREDICTABILITY David Dufour N/A
#108: LOSING BATTLES, WINNING WARS — ACTIVE DEFENSE REBOOTED Rafal wh1t3rabbit Los N/A
#201: USING SERVICE SUPPORTABILITY FOR IT RISK MANAGEMENT Chirag Joshi , Jim Dillon N/A
#202: YOU'RE UNDER A DISTRIBUTED DENIAL OF SERVICE ATTACK. NOW WHAT? James Stoner , Stephen E. Coury N/A
#203: MALWARE/THREAT INTEL ANALYSIS LAB ESSENTIALS Matt Nelson N/A
#204: HONEYPOTS FOR ACTIVE DEFENSE Greg Foss N/A
#205: COLORADO CISOS SPEAK - A PANEL DISCUSSION Robb Reck , Matt Shufeldt , Sue Lapierre , John Hellickson N/A
#206: THERE IS A CRIPPLING CYBERSECURITY ATTACK COMING YOUR WAY! CAN EFFECTIVE LEGISLATION HELP STOP IT? Brian Dickard N/A
#207: DATA THEFT PREVENTION: THE KEY TO SECURITY GROWTH AND INNOVATION Chuck Bloomquist , Bob Slocum N/A
#208: BUILDING A SUCCESSFUL SECURITY PROGRAM FROM SCRATCH Dave Herrald , Jerry Scott N/A
#301: IT TAKES SYNC TO MAKE DR GO RIGHT. IT TAKES LAYER 2 TO MAKE IT OUT OF SIGHT. Chad Baker N/A
#302: IMPLEMENTING AN AUTOMATED INCIDENT RESPONSE ARCHITECTURE Jessica Hebenstreit , James Carder N/A
#303: A MALWARE DEVELOPER'S GUIDE TO BLOCKING AN ATTACK Brady Bloxham N/A
#304: HIDDEN TRUST, A DARK WEB OF TRUST RELATIONSHIPS THAT YOUR ORGANIZATION DOESN'T KNOW ABOUT Jacob Torrey N/A
#305: THE SAVVY SECURITY LEADER: USING GUERRILLA TACTICS TO ID SECURITY PROGRAM RESOURCES John B. Dickson N/A
#306: MOVING TO A DATA ANALYTICS CULTURE Scott Schubert N/A
#307: Risk is What’s Left When Compliance Doesn’t Equal Security Jeff Young , Lanny Stoltenberg N/A
#308: Advice From The Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation Marshall Heilman N/A
#401: SDN SECURITY: TWO SIDES OF THE SAME COIN Scott Hogg N/A
#402: PERFORMING ADVANCED INCIDENT RESPONSE Merlin Namuth N/A
#403: SCALING SECURITY IN AGILE SCRUM Ryan O'Boyle N/A
#404: AUTOMATE OR DIE! HOW TO SCALE AND EVOLVE TO FIX OUR BROKEN INDUSTRY Ben Tomhave N/A
#405: AN (OVER) SIMPLIFIED APPROACH TO DATA CLASSIFICATION Robert Rudloff N/A
#406: FEDRAMP: THE NEW BASELINE FOR SECURITY AND COMPLIANCE IN THE CLOUD Rob Barnes N/A
#407: The Changing Landscape of Cyber Incident Response Matthew Mccormack N/A