Lockdown2019 2019 July 17, 2019 to July 17, 2019, Madison, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: The Digital Cage Kashmir Hill Amazon, Google, Facebook, Apple, and Microsoft have been called the "frightful five" of the technology ...
Building Incident Response Scenarios for Insider Threats Brian Reed This session will cover the different types of insider threat scenarios and how you should ...
Criminological Theories of Computer Crime Chad R. Johnson Traditional criminological theories applicable to offline crimes do not often translate well to computer crimes. ...
How To Boost Your Productivity and Security Posture: Password Mangers and VPN Ryan Nagler Securely managing accounts for all the sites that we use in our day to day ...
PaIRS: Point of contact and Incident Response System – Finding bad actors without looking at content Joel Rosenblatt The PaIRS system uses Netflow data to discover compromised machines on the University network without ...
Confronting Piracy in Academic Research, the Sci-Hub Story Sari Frances Sci-Hub obtains content by accessing the secure computer networks of major universities by, among other ...
Women, elderly and children: Why cybersecurity and privacy hit some groups more Heather Stratford Cybersecurity is a uniform problem that is affecting all people in our society, but some ...
Next-Generation Risk Management: Achieving compliance with the NIST Cybersecurity Framework Hunter Ely Colleges and universities host a myriad of technologies that must be secured. Whether it is ...
You’ve Been Pwned…But Your Customers Are The Target. Lessons learned from attacks against the power grid. Christopher Hickernell In January 2019, the Wall Street Journal published an article that reconstructs what it called ...
Cyberbullying: What We All Need to Know Tim Bohn As adults, we all have kids in our lives (whether they are our own children ...
Addressing Cyber Security Threats with a Constantly Evolving Threat Landscape N/a Recent high-profile cyberattacks have prompted education institutions and enterprises alike to enhance their security network. ...
LastPass as a solution to Credential Stuffing attacks John Thompson Phishing is not the primary driver behind the epidemic of compromised credentials being used to ...
Privacy and Security Collide Heather Stratford Cybersecurity is one of the great threats to our current way of life and future. ...
Crypto Hygiene 101 or: How I Learned to Stop Hoping for Security and Love Cryptography Allan Rabke What does ‘secure’ even mean??? In cryptology, security is a function of time relative to ...
Big Data, Little Privacy Lee Imrey As our relationship with technology evolves, our computers, phones, and other devices make our lives ...
Closing Keynote: You’re All a Bunch of Phonies! Imposter Syndrome and Information Security Tara Hughes Imposter Syndrome can cause outwardly successful individuals to be riddled with self-doubt. In the fast-paced ...