BlackhatExecutiveSummit 2015 Dec. 8, 2015 to Dec. 10, 2015, scottsdale,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CISO BEST PRACTICES: IDENTIFYING AND RESPONDING TO INSIDER THREATS Robert Jamieson , Nick Graf , John D. Johnson , Drew Bjerken It’s much easier to notice the adversary beating at your door, but how are businesses ...
CYBER INSURANCE: RISKS, REWARDS, AND OUTCOMES Mark Weatherford , Ben Beeson It’s become one of the industry’s most hotly contested issues, and one that has captured ...
PIVOTING FROM ATTRIBUTION TO RETRIBUTION: THE NEW DETERRENCE Stewart a. Baker The conventional wisdom in cybersecurity is that better defense is our only hope because attribution ...
PROACTIVE DEFENSE: USING CYBERSECURITY VALUE-AT-RISK TO ESTIMATE YOUR THREAT SITUATION Rod Beckstrom CyberVaR™, or cyber Value at Risk, is a risk estimation method that provides top management ...
RED TEAM PLANNING AND BEST PRACTICES Dhs A Facilitated TTX, led by the DHS, in which their red team takes the attendees ...
RESPONDING TO PERSISTENT THREATS: BEST PRACTICES FOR KEEPING THE NATION STATES AT BAY Dmitri Alperovitch , Pete Murphy One of the most pernicious threats to corporate enterprises are persistent attackers that launch long-term ...
RISING TO THE CHALLENGE OF E.U. DATA PROTECTION REGULATIONS Steven f. Fox , Stefano Mele The European data protection regime is evolving in response to privacy, security, and governance concerns ...
SECURITY AND PRIVACY IN THE AGE OF BIG DATA AND IOT Theresa Payton As we look ahead to a new era of data and information security, how will ...
SECURITY AS A CORE BUSINESS VALUE Elena Kvochko Advocates of cyber-resilience have been supporting the notion that businesses should assume they have already ...
THE FTC’S SECRET LAW: WHAT YOU NEED TO KNOW ABOUT THE CYBERSECURITY WATCHDOG’S EXPECTATIONS AND STRATEGY IN REGULATING YOU Michael Daugherty While the FTC, FCC, and Homeland Security joust over who is going to regulate the ...