SecureWorldNewYork 2019 Sept. 25, 2019 to Sept. 25, 2019, New York City, United States
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Don't WannaDie: Using a Zero Trust Approach to Secure Healthcare | Christopher Frenz | A hospital falling victim to ransomware has become an all too frequent occurrence and one ... | |
Mitigating Social Engineering Attacks: Knowledge Is Power | Rod Aday | Too many of us have called end-users the weakest link in security, and this has ... | |
Intentional Data Privacy: California Consumer Privacy Act | Michael B Jones | I. What intentional data privacy meansII. Background and overview of CCPAIII. Affected entities and applicability(assume ... | |
[OPENING KEYNOTE] Securing the Enterprise: Challenges and Trends in the Age of Fake News and Real Threats | Nick Selby | Enterprise information security vulnerabilities are being created at an accelerating pace by asymmetric migration paths ... | |
[Trend Micro] Automate Prevention, Detection and Response in the Cloud | Tim Miller | Today’s advanced threats are designed to bypass traditional cybersecurity defenses and compromise sensitive corporate data. ... | |
[OneTrust] CCPA: 5-Step Guide to California Consumer Privacy Act Compliance | Doug Boykin | With the clock ticking down until the California Consumer Privacy Act (CCPA) comes into effect ... | |
[Avanan] How Hackers Bypass Email Security: An Attack Guide for the Uninitiated | Michael Landewe | The scale of email migration to the cloud requires a strategic shift in security for ... | |
[LUNCH KEYNOTE] Zero to 60: Making Security Programmatic and Cultural at Princeton University | David Schaufler | Join members of Princeton University’s Information Security Office as they discuss their mission, focus, and ... | |
Panel discussion: Building a Better Mouse Trap (Emerging Threats) | Roman Garber , John Linzy , Eddie Doyle , Jeff Miller | To be successful, as an industry, we must strive to get ahead of the bad ... | |
Shifting Landscape of Attack Vectors | Michael Landewe , Denis Calderone , Ross Dyer , Marija Strazdas | If one thing holds true in cybersecurity it is the fact that our adversaries are ... | |
A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape | Jordan Fischer | The U.S. legal framework for cybersecurity and data privacy continues to evolve, trying to stay ... | |
What Type of Security Assessment Is Best for Your Environment: Risk, Gap, Vulnerability, Penetration, or Audit? | Sandy Bacik | Many new regulations are requiring security assessments and testing be performed within the organization operational ... | |
What are the types of security reviews and tests, and what can they encompass | How Engagement | Gotchas | |
Things We Should Be Aware of Before Adopting SDP (Software Defined Perimeter) | Parthasarathi Chakraborty | Software Defined Perimeter (SDP) is the new buzzword, and indeed it brings a lot of ... |