SecureWorldChicago 2019 June 13, 2019 to June 13, 2019, Chicago, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework Larry Wilson The University of Massachusetts has developed a 6-hour SecureWorld PLUS training class that instructs attendees ...
Cyber Defense Ineffectiveness and What We Can Do About It Christian Espinosa Throughout this training session, Christian Espinosa will candidly discuss the following key elements:Despite all the ...
Are Our Cybersecurity Solutions Ready For an AI World? Col. Cedric Leighton N/A
Selling the Value of Security to Your Organization Matthew Dechant N/A
Third Party Vendor/Supply Chain Security Risk Management Arvin Verma How to build out and effectively run your own third-party vendor risk management program and/or ...
Crypto Gold Mine: Are Your Clients Safe? John Fatten N/A
Planning Effective, Scenario-Driven Purple Team Engagements Chris Rappeport Join this presentation to inquire how setting goals and starting with a solid scenario is ...
OPENING KEYNOTE — The Nation-State, the Corporation, and You: Cybersecurity in the Cyber Age Col. Cedric Leighton N/A
Legal Issues in AI, IoT and the Cloud of the Future Dr. Raj Sachdev AI, IoT and the Cloud are no doubt changing the way we live in the ...
Protecting the Brand Fred Kwong When security practitioners look at brand risk, they often rely on security controls that focus ...
Anatomy of an Attack: Live Email Hack Mike Shine Let’s face it: E-Mail is still the biggest entry point into your organization, even in ...
Protecting Your Organization from Cyber-Physical Attacks William J. Malik IoT poses huge security and privacy challenges to individuals and businesses. Technical measures, deployed at ...
LUNCH KEYNOTE: Quantum Computing, Blockchain, AI, STOP - Get Back to the Basics Ricardo Lafosse There are more than 500 security vendors at any given time and as security practitioners ...
Panel: Building a Better Mouse Trap (Emerging Threats) Ted Shorter , Mike Shine , John Kellerhals , Brian Kovick To be successful, as an industry, we must strive to get ahead of the bad ...
Battle for the Endpoint Continues John Fatten , Brandon Meyer , Keith Weisman , Gary Patterson , Ron Pipkins What are you doing to keep the network safe for your employees? You’ve got your ...
Integrating Public and Private Sector Scott Swanson This session will show how the public/private sector integrates intelligence for mutual benefit.
Learn 6 big decisions organizations must make in response to insider threat Barry Herrin According to a 2014 IBM study, 31.5% of all cybersecurity incidents were perpetrated by malicious ...
Building a Better Cyber Awareness Training System with Machine Learning and Artificial Intelligence Tam Nguyen Cybersecurity awareness training (CAT) should be adaptable to the evolving cyber threat landscape, cost effective, ...
Rise of Industrial 4.0: Crippling a Country Through Cyber Attacks in Manufacturing Dr. Jr. When we think of the breach of data, it could be the least of the ...