SecureWorldNewYork 2019 Sept. 25, 2019 to Sept. 25, 2019, New York City, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Don't WannaDie: Using a Zero Trust Approach to Secure Healthcare Christopher Frenz A hospital falling victim to ransomware has become an all too frequent occurrence and one ...
Mitigating Social Engineering Attacks: Knowledge Is Power Rod Aday Too many of us have called end-users the weakest link in security, and this has ...
Intentional Data Privacy: California Consumer Privacy Act Michael B Jones I. What intentional data privacy meansII. Background and overview of CCPAIII. Affected entities and applicability(assume ...
[OPENING KEYNOTE] Securing the Enterprise: Challenges and Trends in the Age of Fake News and Real Threats Nick Selby Enterprise information security vulnerabilities are being created at an accelerating pace by asymmetric migration paths ...
[Trend Micro] Automate Prevention, Detection and Response in the Cloud Tim Miller Today’s advanced threats are designed to bypass traditional cybersecurity defenses and compromise sensitive corporate data. ...
[OneTrust] CCPA: 5-Step Guide to California Consumer Privacy Act Compliance Doug Boykin With the clock ticking down until the California Consumer Privacy Act (CCPA) comes into effect ...
[Avanan] How Hackers Bypass Email Security: An Attack Guide for the Uninitiated Michael Landewe The scale of email migration to the cloud requires a strategic shift in security for ...
[LUNCH KEYNOTE] Zero to 60: Making Security Programmatic and Cultural at Princeton University David Schaufler Join members of Princeton University’s Information Security Office as they discuss their mission, focus, and ...
Panel discussion: Building a Better Mouse Trap (Emerging Threats) Roman Garber , John Linzy , Eddie Doyle , Jeff Miller To be successful, as an industry, we must strive to get ahead of the bad ...
Shifting Landscape of Attack Vectors Michael Landewe , Denis Calderone , Ross Dyer , Marija Strazdas If one thing holds true in cybersecurity it is the fact that our adversaries are ...
A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape Jordan Fischer The U.S. legal framework for cybersecurity and data privacy continues to evolve, trying to stay ...
What Type of Security Assessment Is Best for Your Environment: Risk, Gap, Vulnerability, Penetration, or Audit? Sandy Bacik Many new regulations are requiring security assessments and testing be performed within the organization operational ...
What are the types of security reviews and tests, and what can they encompass How Engagement Gotchas
Things We Should Be Aware of Before Adopting SDP (Software Defined Perimeter) Parthasarathi Chakraborty Software Defined Perimeter (SDP) is the new buzzword, and indeed it brings a lot of ...