SouthFloridaISSA 2019 March 22, 2019 to March 22, 2019, Davie, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attacks on the Modern Web Ana Schulze Now from what I read ad hear the buzz is that A.I and automation are ...
Event Driven Security and Automating Incident Response in the Cloud Jonathan Villa Cloud IaaS is built upon API driven computing services allowing security teams to design and ...
Assessing Device Integrity Robert Rounsavall What you can assess by looking at the hardware, software, configuration, and operation of a ...
For Love or Money, Your IT Career Alex Funkhouser Contracting at the cutting edge of technology is exciting and produces great rates. But what ...
Security 3.0 for a Hyperconnected World Michael Ramirez The talk will focus on how emerging technologies and the accelerated pace of developing consumer ...
Red Team Exercises & Adversary Emulations Jorge Orchilles How to successfully run an end to end adversary emulation red team exercise.
Developing the Incident Response Plan Donald King Organizations know they need to have a comprehensive Incident Response plan in place, but often ...
Keynote Dave Aitel N/A
Third-Party Risk Management: Beyond Data Collection Chad Peterson When assessing third-parties vendor, the collection of the data is only the beginning. This presentation ...
The Seduction of the Cloud - When Employees Misbehave Andrew Mapp A Technical case study on employee data theft. When key employees exfiltrate company trade secrets ...
Data Security in a Cloud First World: Secrets, Stories, and Suggestions Tim Davis Cloud makes data security more challenging. How do you regain the level of access control, ...
Using Deep Learning to uncover darkweb malicious actors and their close circle Rod Soto This presentation shows how data driven techniques can be used to provide vision and establish ...
Securing Information Integrity with Blockchain Mila Paul We've all heard about Bitcoin and blockchain but what is the true difference? Why is ...
Building Security Automation Playbooks Lior Kolnik SOC and IR professionals are required to use myriad different tools and services to handle ...
501.171, 179.100 - Who ya gonna call? Ana Schulze Now from what I read ad hear the buzz is that A.I and automation are ...
CISO Panel Forum Pete Nicoletti , Mauricio Angée , Janet Heins , Helvetiella Longoria N/A