CrestCon2019 2019 March 14, 2019 to March 14, 2019, Charlotte, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SecureWorld PLUS - Insider Threat: A White Hat Hacking Methodology Approach to Insider Threats Mike Muscatell •Information on the internet•Why hack yourself?•Cleaning your information•Maintaining cleanliness•Basic safety going forward•Privacy legislation – what ...
Cyber Resiliency: Reducing Your Risk by Increasing Your Resiliency Stephen Head Cyber Resiliency enables organizations to take actions that reduce their overall risk, minimize the impact ...
[SentinelOne] The Power of One: Autonomous Endpoint Protection Parker Crook As a decision maker trying to improve security posture in an increasingly sophisticated threat landscape, ...
[Check Point Software Technologies] My CEO Told Me We Have to Move Our Datacenter to the Public Cloud... So, What's the Big Deal? Grant Asplund In this session, we will discuss why today’s IT organizations require mature and complete native ...
OPENING KEYNOTE: Recent Cyber Threats and Trends from the FBI Brian Cyprian Special Agent Brian Cyprian will highlight recent cyber threats and trends seen by the FBI, ...
Moving Your Business Securely Out of Your Data Center - Into the Cloud Mike Brannon Your business can adopt new tools, new processes that add lots of value – and ...
[DHG] Operational Technology: The “Other” Cybersecurity Fred Gordy Organizations have traditionally focused cybersecurity initiatives on enterprise IT infrastructure and systems. Yet, non-traditional, legacy ...
LUNCH KEYNOTE: Establishing and Evaluating Effective Cybersecurity Programs Stephen Head , Frank Depaola , Larry Eighmy , Torry Crass , Mike Hillhouse , Andre Mintz , Thomas Tollerton , Dixon Hughes Goodman How to do it and how to test it involves strategic planning and leadership at ...
Panel: Building a Better Mouse Trap (Emerging Threats) John Mcclurg , Ron Winward , Patrick Barry , Rich Burke , Chris Steven , Mike Kiser To be successful, as an industry, we must strive to get ahead of the bad ...
Panel: Access Control – the End of the Password? Jorge Alago , Gary Walderich , William Clay James , William Curtis “Open Sesame!” Whether you recognize the term coming from Ali Baba or one of the ...
Finding Your Vulnerabilities—Before Attackers and Auditors Do Michael Holcomb Do you know where all of your cyber security vulnerabilities are? As enterprise defenders and ...
Scoping Insights for Compliance Data Claire Lavelle This presentation addresses the scoping issues that exists in compliance programs. It reviews de-scoping techniques ...
Applying the Scientific Method to Cybersecurity Event Analysis Brandi Keough What is one of the biggest frustrations when analyzing a cybersecurity event? To me, it ...