SecureWorldAtlanta 2019 May 29, 2019 to May 30, 2019, Atlanta, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape Rebecca Rakoski A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape. The US legal ...
The March of the Chain Gang: Understanding Security Risk in Integrated Blockchain Solutions Justin Daniels The next generation of blockchain solutions will integrate AI, tokenization, smart contracts, and IoT. Each ...
Fired for Failing to Forward an Email: My Personal Story of the 2017 Equifax Data Breach Graeme Payne In September 2017 Equifax reported that its systems had been attacked and criminals had accessed ...
OPENING KEYNOTE — Going Digital: Building Your Strategic Roadmap for the Next Wave of Digital Transformation Steve Brown The next major wave of digital transformation will integrate the physical parts of your business ...
Reporting to the Board: the NACD Cyber-Risk Oversight Handbook James Baird The National Association of Corporate Directors (NACD) has published guidance to its members on what ...
Vetting Your Vendors: Understanding the “Chain of Control” of Data, Security Pitfalls in Third-Party Contracts, and Service Agreements Rebecca Rakoski One of the most important considerations in cybersecurity does not involve your own direct network ...
Securing Government First: Reducing Risk and Protecting State, Local, Tribal & Territorial (SLTT) from Cyber Threats Samuel Blaney State, Local, Tribal and Territorial (SLTT) governments face the threat of continuous cyber-attacks from numerous ...
Executive Perspective on Cybersecurity Awareness Cissp , Terry Ziemniak We will review recent surveys with dozens of organizational leaders regarding security awareness, covering a ...
LUNCH KEYNOTE: What Should Be on the Mind of a CISO? Tim Callahan This presentation will cover aspects of security that should be top of mind for every ...
Panel: Building a Better Mouse Trap (Emerging Threats) Yasser Fuentes , Brandon Meyer , Jay Miller To be successful, as an industry, we must strive to get ahead of the bad ...
Walking a Contract: Understanding Corporate Legal Requirements (a.k.a - Legal for Non-Lawyers) Phillip Mahan Security & IT professionals often are called upon to review the requirements inside Legal Agreements. ...
An Introduction to FAIR Risk Analysis Donna Gallaher Factor Analysis of Information Risk (FAIR) is the leading methodology for Quantitative Risk Analysis for ...
Employer Data Breach Liability: The Employee as a Threat Vector Barry Herrin According to a 2014 IBM study, 31.5% of all cybersecurity incidents were perpetrated by malicious ...
ISSA Executive Panel and Reception Sherron Burgess , Deborah Wheeler , Phyllis Woodruff , Ann Marie Isleib N/A
Preparing for the Human Factor in Our Cyber Future Samantha Dutton This presentation will help alleviate the mystery of soft skills. As employers struggle attracting and ...
3 Things You Absolutely Need to Know About Data Privacy in 2019 to Move Your Organization Forward Jodi Daniels In today’s business landscape, privacy will make you more innovative and become your competitive advantage. ...
7 Ways to Boost InfoSec’s Influence (and Yours) by Communicating Differently Bruce Sussman Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by ...
OPENING KEYNOTE — Wicked Problems: Planning for Cyber Defense David Allen Numerous “wicked” problems, to include cyber defense, face our society today that cannot be solved ...
Riding within the Risk Appetite: Being Reasonable in an Unreasonable World Phillip Mahan Security professionals have the ability every day to secure a business right out of business. ...
[Insight] Motivating Internal Teams for Security Ed Snodgrass Pursuit of security compliance certifications can be challenging. Actively engaging engineering teamsand enthusiastic participation by ...
Internet of Things: Privacy, Security, and Regulation Esq. , Salar Atrizadeh This seminar will discuss the Internet of Things (IoT) and the related legal problems. The ...
Third-Party Risk: Creating and Managing a Program that Works! David Barton Every organization is concerned with third-party risk. No one wants to be the next Target ...
When the Answer Really Is "No"—How to Say It Diplomatically Tamika Bass As cybersecurity experts, our overall goal is to protect the confidentiality, preserve the integrity, and ...
LUNCH KEYNOTE: How to Manage Your Own Career to Get to the Top Mark Gelhardt Do you have a plan for your future? Why not? You are the leader of ...
Panel: Shifting Landscape of Attack Vectors session Jerrod Piker , Rj Sudlow , Mike Van Doren , Matthew Farr If one thing holds true in cybersecurity it is the fact that our adversaries are ...
Panel: The Battle for the Endpoint Continues (Endpoint Security) Jorge Alago , Mark Hubbard , Tom Callahan , Dave Vance , Ron Coe What are you doing to keep the network safe for your employees? You’ve got your ...
Unearthing Hidden Security Talent Cameron Chapman Recognizing there is a global security talent shortage we believe we have come across some ...
Intentional Data Privacy: California Consumer Privacy Act Now is the time to prepare for changes required by California's new privacy law Michael B Jones Michael will be giving away an Echo Show and Echo Dot during this breakout session!I. ...
Bitcoin & Cryptoeconomics Linda Marcone A presentation about crypto assets and why they will be important in your future.