SecureWorld 2019 Aug. 21, 2019 to Aug. 21, 2019, Santa Clara, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Continuous Monitoring Role in a Risk Management Framework Sarah Lange Continuous monitoring is an integral step for ongoing awareness of information security, vulnerabilities, and threats ...
Data Laundering, Exploitation, and Extortion: Time for Ethical AI Craig Spiezle We are facing seismic change with the convergence of big data and AI. The oceans ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Stephen Dougherty The average loss from a bank robbery is about $3,000. The average loss from a ...
Topic: Building Blocks for a Secure Cloud Platform Philip Cox N/A
Data Protection in the Public Cloud: A Look at the Good, the Bad, and the Ugly Kenneth G. Hartman Customers want to ensure that they can entrust their sensitive data to public cloud providers. ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? John Heasman , Maarten Van Horenbeeck , Kevin Paige , Rinki Sethi , Dave Ruedger N/A
[Mimecast] The Human Firewall Is on Fire: What Do You Do When the Smoke Clears? Zach Turner As today’s attacks have become more sophisticated, we are focused on helping organizations to improve ...
[Kenna Security] Use the Data, Luke! Improving Security Outcomes with Intelligence, Automation, and Awareness of Risk Jonathan Cran Security practitioners are forced to make millions of difficult decisions over their careers—fix this thing ...
[LUNCH KEYNOTE] The Top Cyber Threats for 2019 and How to Work with the FBI After a Data Breach Elvis M. Chan This presentation will provide the FBI’s perspective on the top cyber threats for 2019, discuss ...
Panel: The Shifting Landscape of Attack Vectors Zach Turner , Dave Ruedger , Vivek Sharma , Poorna Udupi If one thing holds true in cybersecurity it is the fact that our adversaries are ...
Panel: Building a Better Mouse Trap (Emerging Threats) Jonathan Cran , Kurt Van Etten , Ibrahim Al-islam , Mounir Hahad , Michael Stuyt , Chad Holmes To be successful, as an industry, we must strive to get ahead of the bad ...
[OneTrust] CCPA: 5-Step Guide to California Consumer Privacy Act Compliance Ethan Sailers With the clock ticking down until the California Consumer Privacy Act (CCPA) comes into effect ...
Crisis Management: Practical Tips for Preparing for, Responding to, and Limiting Reputational and Financial Risks Associated with Data Breaches Ann Marie Mortimer A crisis can happen at any moment, potentially interrupting an organization’s business operations, threatening public ...
Thoughts on Cyber Threat Hunting Selim Gadewar Cyber threat hunting has become increasingly important as companies strive to stay ahead of the ...
Security Awareness: How to Truly Create a Complex but Memorable Password Steven Lentz In this session, we will discuss how to create complex passwords without using password managers ...