NYMJCSC 2016 Oct. 5, 2016 to Oct. 5, 2016, new york,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Nicholas J. Percoco , Larry Clinton | President and Chief Executive Officer, Internet Security Alliance Larry Clinton is President and CEO of ... | |
Turning Hackers’ Gold – Data – into Straw | Cindy Cullen | Data has become king in the enterprise. As organizations are in an “arms race” to ... | |
Look mom! No vulns!”: Attacking Smart Systems By Faking Signals, No 0-Days Required. | Michael Shalyt | As the world becomes increasingly Smart, we rely more and more on remote sensor data ... | |
Using Data Intelligence to Separate Fact from Fiction on the Dark Web | Danny Rogers | Much myth surrounds the dark web. In fact, even defining it is a challenge, as ... | |
Introduction to Malware Analysis - 0 to 60 in Under an Hour | Lenny Zeltser | Knowing how to analyze malware has become a critical skill for incident responders and other ... | |
Cloud Security vs On-Premises Security What's better, what's different | Dan Stolts | Often technology and even security professionals approach security of their entire infrastructure in the same ... | |
Software Supply Chain Management: Enabling Enterprise Resilience and Cybersecurity Assurance | Joe Jarzombek | As the cyber threat landscape evolves and as software dependencies grow more complex, understanding and ... | |
What the Security Professional Needs to Know about Cryptography | William Hugh Murray | This presentation will cover those things which security practitioners need to know about cryptography that ... | |
The *Vulnerability* Response Program – Responding to attacks that haven’t even happened yet | Jeff Williams | You probably have an incident response program in place, but do you have a *vulnerability* ... | |
Why The Cloud Is About To Become The Most Secure Storage Platform in History | Paul g. Lewis | How Secure is the Cloud? It is about to become the most secure storage platform ... | |
Improving The Security of Your Organization via Mock Malware Incidents | Christopher Frenz | An all too common headline is becoming “business held for ransom” as organizations begin to ... | |
Access Control Lists so 1900’s Let us move past the 1980’s technology | Jay Ferron | We’ve been using Access control to protect data for years, but it’s just not working ... | |
Meet Hal, My New AI Intelligent Automated Incident Responder | Paul Ferrillo | Meet Hal, my new AI-intelligent cyber security incident responder. Yes, AI-Intelligent Automated Incident Responder. Responding ... | |
Measuring the Cybersecurity of Software | Lev Lesokhin | Recent security breaches such as the ones at SWIFT and Target are entering the realm ... | |
Deep, Fast & Strong: IAST & RASP for Techies – Understanding How Runtime Analysis Actually Works! | Ofer Maor | IAST (& RASP) are revolutionary technologies, which are starting to get traction in the market. ... | |
The Real Final Frontier - Defending the Human | Kenneth Newman | Talk will present relevant research on why most cyber security awareness efforts fail and what ... | |
Red Teaming the C-Suite--The Ultimate InfoSec Awareness Program | Thomas Stephenson | The sad truth is Cybersecurity Awareness Programs can be stale, boring and ineffective leaving many ... |