SecureWorldHouston 2019 April 18, 2019 to April 18, 2019, Houston, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Phishing, Man-in-Middle: Making Sense of Strong Authentication Girish Chirovolu In this presentation we look at FIDO2 closely, discuss some of the challenges with FIDO, ...
The Legal Component of Incident Response session level icon Jeremy Rucker Legal obligations attach when a data privacy or security incident occurs. An important component to ...
OPENING KEYNOTE: Computer Threats Samuel Sutton Join Samuel Sutton—CASP, CISM, and Computer Scientist with the FBI—to discuss some of the dangers ...
Humio: The Mitre ATT&CK Framework Is for All of Us, and It Is Time to Pay Attention to It session level icon Michael Gough Mitre has created the “Adversarial Tactics, Techniques & Common Knowledge” (ATT&CK) base to help security ...
When the Cyber Intrusion Alarm Rings, Will You Know? Norman Comstock There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden ...
Navigating to the Cloud session level icon Mario Chiock N/A
Establishing a Workable Security Program on a Tight Budget Anne Rogers Ask any Security Professional…We never seem to have all the resources or people we need ...
LUNCH KEYNOTE: Why Teams, Strategies, and Processes Are Essential for Managing Cyber Risk Shawn E. Tuma In twenty years of practicing cyber law, Shawn Tuma has seen a multitude of real-world ...
Panel: Building a Better Mouse Trap (Emerging Threats) Michael Gough , Loyd Mcbride , Paul Brager , Eugene Kesselman , Paul Berryman , David O’neil To be successful, as an industry, we must strive to get ahead of the bad ...
Panel: You Got Burned, Now What? (Incident Response) Gregg Braunton , Paul Schofield , Duwayne Engelhardt , Eric Botts , Manoj Tripathi , Ram Yarlagadda We’ve all heard the adage that it’s not if it happens but when you are ...
Employer Data Breach Liability: The Employee as a Threat Vector Barry Herrin According to a 2014 IBM study, 31.5% of all cybersecurity incidents were perpetrated by malicious ...
The Divergence and (re)Convergence of the CIO and CISO Roles Manoj Tripathi There has been considerable effort spent over the decades to achieve a clear separation between ...
Steganography: How to Prove It Is You Kalani Hausman Steganography is as old as the written word, and can prove it is you by ...