SecureWorldBoston 2019 March 27, 2019 to March 27, 2019, Boston, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SecureWorld PLUS Part 1 - How to Build the Future: A Deep Dive into Artificial Intelligence, Blockchain, and Preparing Your Organization for 5-10 Years Ahead Steve Brown N/A
SecureWorld PLUS Part 1 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity Framework Larry Wilson N/A
SecureWorld PLUS Part 1 - Cloud Security Essentials Joseph Fontecchio N/A
ISSA Chapter Meeting and Presentation - Open to all Attendees Tasneem Alexander N/A
Navigating the Uncharted Cybersecurity Career Path Mark Aiello N/A
Security Awareness Training: Building Your Brand Scott Margolis N/A
LIFARS Panel: Preparing for the Inevitable: A Discussion of Case Studies in Cybersecurity Successes and Failures Ondrej Krehel , Joseph Rogalski , Mike Fabrico , Heather Bearfield N/A
OPENING KEYNOTE — Going Digital: Building Your Strategic Roadmap for the Next Wave of Digital Transformation Steve Brown N/A
Hearing Voices: The Voice of the Cybersecurity Professional Is Finally Heard! Candy Alexander N/A
[baramundi] Innovative Endpoint Management A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution Robert Troup N/A
[Radware] Cybersecurity Pushed to the Limit Ron Winward N/A
[Mimecast] Cyber Resilience: Making Office 365 Safer for Business Adib Sarakby N/A
Leadership and Driving Change within the Organization Bruce Forman N/A
Vulnerability Management in an Academic/Research Environment Bryan Boyce-werner N/A
LUNCH KEYNOTE: Presented by (ISC)2 - Securing a World of Physically Capable Computers Bruce Schneier N/A
Panel: Building a Better Mouse Trap (Emerging Threats) N/a N/A
Panel: You’ve Got Burned! Now What? (Incident Response) N/a N/A
Panel: Knowledge Is Power (Encryption) N/a N/A
Why Can't the Business and IT Get Protection Right? Sandy Bacik N/A
A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape Jordan Fischer N/A
[Cisco] Cloud Security: Stepping into the Cloud with Confidence Brian Tobia N/A
Panel: The Unstoppable Convergence of Physical and Cybersecurity Michael Brown , Edward F. Davis , Ernesto Digiambattista N/A
SecureWorld PLUS Part 2 - How to Build the Future: A Deep Dive into Artificial Intelligence, Blockchain, and Preparing Your Organization for 5-10 Years Ahead Steve Brown N/A
SecureWorld PLUS Part 2 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity Framework Larry Wilson N/A
SecureWorld PLUS Part 2 - Cloud Security Essentials Joseph Fontecchio N/A
SecureWorld PLUS Part 3 - How to Build the Future: A Deep Dive into Artificial Intelligence, Blockchain, and Preparing Your Organization for 5-10 Years Ahead Steve Brown N/A
SecureWorld PLUS Part 3 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity Framework Larry Wilson N/A
SecureWorld PLUS Part 3 - Cloud Security Essentials Joseph Fontecchio N/A
Implementing a ‘Zero Trust’ Approach for Securing Your Enterprise Environments Kevin Mcpeak N/A
Information Security and Risk Management: A Decision Support Tool, a Cultural Change Agent, the Answers to the Quiz About Truly Knowing Sean Baggett N/A
Blockchain and Data Protection Laws: Can They Co-Exist? Jordan Fischer Blockchain and Data Protection Laws: Can they Co-Exist? With the increasing emphasis on data privacy, ...
[SSH] 5 Ways to Bypass PAM Jimmy Mills N/A
Why Move? Lessons Learned Working Internationally in APAC Roy Wattanasin N/A
OPENING KEYNOTE: [Cisco] The Birth of Crypto Has Changed the Threat Landscape Mark Stanford N/A
A New Rubric for IT Recruiting and Retention Sandy Silk N/A
EU GDPR: Enforcement Landscape, Key Security Risks, and Recommendations Joan Antokol N/A
[Rapid7] A Field Guide to Measuring Internet Exposure with Industry Examples from the Fortune 500 Bob Rudis N/A
[GuidePoint Security] Principles of an Effective Cloud Security Strategy Jonathan Villa N/A
Lessons from Lighthouse Keepers Esmond Kane N/A
Vulnerability - The Intersection of Cyber, Physical, Personnel and Document Securities Joel Weinstein N/A
[Radware] Game of Threats Daniel Smith N/A
Panel: Access Control – The End of the Password? N/a N/A
Panel: The Battle for the Endpoint Continues (Endpoint Security) N/a N/A
Panel: Shifting Landscape of Attack Vectors N/a N/A
Security Challenges: Rolling out a Cloud Offering Across a Global Organization Velu Jeganathan N/A
UNH’s Perfect Storm: Managing the Rapidly-Evolving Identity Threat Landscape Rori Connors N/A
Workplace Violence: Preparation Is Key Sue Bergamo N/A