ISC2SecureSummit 2019 April 23, 2019 to April 23, 2019, Washington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Theresa Payton N/A
Conference Kick Off Mr. Gary Hayslip N/A
Bringing a Sea Change to Industrial Control Systems & IoT Security Jim Hietala For the past 30+ years, Industrial Control System networks have been largely proprietary, with the ...
Developing a Career in Information Security: Experiences and Realities N/a The field of Information Security is both exciting and challenging. - There's a lot to ...
Understanding Threats: Why Modeling Equals Strong Security David Kennedy N/A
Bridging the Physical and Logical Security Divide Amy Williams Historically speaking, physical security devices such as cameras and access controls and logical devices such ...
Building Visibility and Security Into ICS Networks - Can OT Trust IT? William Ingram Network security and visibility on ICS networks has traditionally been poor due to the limits ...
Busting the Blockchain Myths Debra Baker Blockchain is one of the hottest topics today and some even claim it will save ...
Cybersecurity for the Rest of Us Tony Sager N/A
Securing Industry 4.0 Geoffrey Gates Today's cyber security frameworks mainly focus on risk of attack as it applies to Confidentiality, ...
Threat Hunting The Right Way John Strand I really, really dislike threat intelligence feeds. It seems like a more complicated and enterprise ...
Duo Security Sponsor Talk: Trust in the Age of Zero Trust Sean Frazier Zero Trust is not a new concept. it was bandied about due to frustrations trying ...
Egress Software Technologies Sponsor Talk - Revisiting Supply Chain Break Risk: New Insights from the Insider Breach Report 2019 Mark Bower N/A
ATO on AWS Program – Compliance as Code Greg Carpenter , Tim J Sandage , Matt Jordan Nearly every customer and/or partner across AWS global public sector community has some compliance or ...
Cybersecurity “Professional” – What Do We Need? Tech Talent or MBA? Brian Bottesini Under the track, “Defining the Profession,” this presentation will highlight different skills and roles required ...
UAVs/Drones are Disrupting the Nation, Consider Innovating Cybersecurity Tomiko Evans Innovating Cybersecurity is necessary when it comes to IoT devices, specifically UAVs/Drones. The purpose of ...
Detecting and Reducing Advanced Threat Dwell-Time with User Behavior Analytics Alexander Attumalil Advanced threat actors are no longer detected by traditional signature based defenses. As detection mechanisms ...
Getting a Seat at the Executive Table Gideon Rasmussen This session provides practical advice to prove yourself 'ready now' for a information security management ...
The Integrity of Things: Hardware Security for Industial IoT Jonathon Taylor First, we’ll discuss research showing the migration of attacks from ransomware and destructive attacks to ...
Keynote: The Key to Career Change: How to Develop Transferable Skills Tiffany Olson Kleemann N/A
The Human Aspect of Cybersecurity Patrick Craven Bring the human aspect of cybersecurity and cyber safety to your business, schools and community ...
The Role of AI in Confronting Cyber(in)Security in loT Ecosystems Lawrence Awuah The development and adoption of Internet of Things (IoT) ecosystem have gained enormous traction, as ...
Zero Trust Networks and Why We Have to Move in That Direction Randy Marchany N/A
Blockchain: Building Better Business Models Securely G. Mark Hardy This presentation will examine the threat landscape, and evaluate how well we are doing at ...
CYBERSECURITY: A Growing Risk for Supply Chain Risk Management J.c. Dodson Supply chain cybersecurity is a subset of broader supply chain risk management but is focused ...
How Upcoming Internet Changes May Blind Your Security Team Steve Ruzila New technologies and changes in how existing protocols are used may not work with current ...
The 'S' in IoT is for Security Derek Fisher Exploring the various businesses and technology that are internet enabled allows one to understand the ...
Unconventional Methods for Sourcing and Cultivating Talent During A Global Workforce Shortage Ju-lie Mcreynolds According to (ISC)2’s 2018 Global Workforce Study, we are experiencing a labor shortage of nearly ...
Follow the Risk with Adaptive Cybersecurity Assessments Gideon Rasmussen This session provides practical cybersecurity assessment advice. It details the end-to-end process including: scoping, work ...
COFENSE Sponsor Talk: The Phishing Menace – The Human/Technology Hybrid Defense Paradigm Andy Spencer Phishing is a universal menace that doesn’t distinguish between victims. Petty cybercriminals to nation-state sponsored ...
Ramping onto the Blockchain: Rewards, Risks and Minefields Marv Williams The impact of the Blockchain is beginning to reverberate throughout our institutions and our society ...
Strategic Storytelling: The Cybersecurity Gap Rebecca Harness Today, the industry struggles to articulate the most pressing risks facing a business, leading to ...
Take On The World! Globalizing Your Security, Privacy and Compliance Program Dave Angarola Is your security and compliance program ready for the world stage? Whether you are a ...
Cybersecurity: How Much is Enough? Michael Firstenberg Advice on costs and benefits of cyber security program for process control systems and critical ...
Protecting Sand Castles in the Tsunami: Applications and Shifting Sands of Security Kevin Johnson In this presentation, Kevin Johnson of Secure Ideas will discuss some of the problems with ...
The AppSec Error Loop: How We Can Break the Cycle and Stop Making the Same Mistakes Pieter Danhieux N/A
Machine Identity Risk as a Threat Vector Steve Armstrong For identity and access management (IDAM), both human and machine access need to be secured. ...
Making Cybersecurity Education Fun Through Gamification and Humor Dr. Mansur Hasib The world of education is changing in two profound ways: 1. Competency-based education and a ...
Operational Technology Knowledge Gap in Industrial Control System Security Craig Reeds When it comes to cyber security of Industrial Control Networks, the biggest problem is the ...
Security on a Shoestring: Building an Open Source Security Operations Center Roselle Safran Every organization needs cybersecurity. But the reality is that budget constraints prevent many from buying ...