SecureWorldCincinnati 2019 May 16, 2019 to May 16, 2019, Cincinnati, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Building a Better Cyber Awareness Training System with Machine Learning and Artificial Intelligence Tam Nguyen Cybersecurity awareness training (CAT) should be adaptable to the evolving cyber threat landscape, cost effective, ...
The Anatomy of a Hack David Howard This presentation will introduce you to the dark side of hacking. We’ll take you through ...
Why a SIEM Isn't Always What It Seems Joseph Thacker Security Incident and Event Managers (SIEM) are a key tool for any good security program. ...
OPENING KEYNOTE: Growing the Cyber Workforce Helen Patton We know there is a shortage of talent, so what can a CISO do about ...
Incident Response: Ready, Set, Test! Lynn Watson Studies show the single most impactful factor to reducing the cost of a cyber breach ...
[Mimecast] Critical Areas to Improve Email Security & Resilience for Office 365 session Matthew Gardiner The success of Office 365 as a SaaS application is undeniable. In fact, Microsoft reports ...
Social Media and Why It Remains the Most Prevalent Vector Lori Anello Social engineering remains a challenge to cyber professionals as it is a threat surface that ...
[Tenable] Quantifying the Attacker’s First-Mover Advantage Paul Russo Security professionals are engaged in a continuous arms race with threat actors. In relation to ...
LUNCH KEYNOTE: Building a Culture that Engages and Retains Top Talent: A Cincinnati Cybersecurity Start-Up Case Study Brian Minick In today’s cybersecurity job market, the talent on your team has a lot of options. ...
Panel: Cloudy With a Chance of Breach Geoff Rance , Kes Jecius , Tim O'connor Everything old is new again. Migrating to the cloud certainly is not a new thing. ...
Panel: Building a Better Mouse Trap (Emerging Threats) Matthew Gardiner , Adam Gates , Paul Schofield , Donovan Blaylock To be successful, as an industry, we must strive to get ahead of the bad ...
Star Wars: How an Ineffective Data Governance Program Destroyed the Galactic Empire session Micah Brown This session will be 100% vendor agnostic and focus on exploring the different types of ...
PCI’s Evolving Approach to Address NextGen Threats Troy Leach Don’t miss this session for a look into the evolution of payments and security standards. ...
Utilizing Dashboards and Metrics to Drive Performance, Measure Success, and Decrease Vulnerabilities Grant Sewell Cyber and threat intel teams leverage numerous dashboards and metrics to guide key actions, intelligence ...