SecureWorldDetroit 2019 Oct. 1, 2019 to Oct. 2, 2019, Detroit, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Social Media and Filter Bubbles: How People and Businesses Are Targeting Users Tony Dancel Social media sites are tracking user data and creating filtered user content, also known as ...
Addressing the Talent Gap in Secure Systems Engineering Matthew Clapham To get out of perpetual reaction mode, we need more professionals with systems engineering experience ...
IoT, a Legal Look: Identifying and Addressing Risks of Connected Devices Kathy Ossian The convenience of an increasing number of smart devices in our professional and personal lives ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
Tribal Security: Leading and Empowering International Teams Steven f. Fox Managers tend to focus on the language, communication, and time zone challenges when working with ...
[Radware] Cybersecurity Pushed to the Limit Ron Winward Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ...
It’s Not Easy Being Blue: When Do Cyber Defenders Become Rock Stars? Ryan Mostiller Cyber Defenders, or members of the Blue Team, don’t often get chances to look like ...
[Trend Micro] What You Should Know About Container Security Rob Maynard Container adoption is growing. With new technologies come new threats and new things to think ...
Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes Jack Freund Communicating risk to nontechnical people is difficult. As security professionals, we can recite the threats ...
[Tenable] Seeing the Forest Through the Trees: A Risked-Based Approach to Maturing Your VMP Rob Walk Tenable products help you accurately identify, investigate and prioritize vulnerabilities. Secure your cloud, containers, OT ...
Advisory Council Lunch Roundtable: Vulnerability and Patch Management Stephanie Scheuermann N/A
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top Mark Gelhardt Do you have a plan for your future? Why not? You are the leader of ...
Panel: Building a Better Mouse Trap (Emerging Threats) Matthew Gardiner , John Fatten , Ron Winward , Chris Burrows , Jams Honey To be successful, as an industry, we must strive to get ahead of the bad ...
Panel: You Got Burned, Now What? (Incident Response) Adam Gates , Gaurav Kulkarni , Gene Kingsley We’ve all heard the adage that it’s not if it happens but when you are ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? Matthew Clapham , Dennis Hodges , Zahira (zah) Gonzalvo , Scott Bennett The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ...
Building a Daily Security Investigation Playbook Marc Harwin As Defenders of Corporate Networks, we are presented with a myriad of potential security data ...
[Mimecast] Phishing Isn't Phun: 10 Techniques to Address this Widely-Used Attack Vector Matthew Gardiner It is no secret that phishing in all its forms remains the #1 entry vector ...
WTH Is a Privacy Engineer? Barbara Hiemstra Until recently, this role didn’t exist (or was done by others under a different name). ...
Third-Party Risk: Creating and Managing a Program that Works! David Barton Every organization is concerned with third-party risk. No one wants to be the next Target ...
Culture and Collaboration: How Working Together Builds the Bridge Between People, Process, and Technology Alexandra Panaretos Having worked in many different industries, company sizes, and employee populations as both a consultant ...
[Panel] The Future of Transportation: Navigating the Automotive Cybersecurity Ecosystem Amy Pfosi This dynamic discussion features three of the leading voices in the automotive supply chain. This ...
[OPENING KEYNOTE] A Fireside Chat with Dr. Larry Ponemon Dr. Larry Ponemon Google the words “Ponemon Institute Research” and you’ll find more than a quarter-million results. Dr. ...
Advisory Council Roundtable: Converging all Aspects of the Cybersecurity Operation (Electronic, Physical and Personnel) Dan Shoemaker N/A
Building the 'Cyber 9-1-1' Hotline for US Victims of Online Crime Kristin Judge The Cybercrime Support Network (CSN) is working with federal, state, and local law enforcement and ...
[baramundi] Innovative Endpoint Management: A Security Baseline That Is Too Often Not Met Holger Weeres This session outlines some security and patch management basic issues that are often overlooked or ...
[Cisco] Malicious Cryptomining is Exploding - Are You at Risk? John Fatten With a 200x increase in crypto-related traffic in 2019, there’s never been a better time ...
Automotive Cyber Attack: A Perspective from the Driver's Seat Kristie Devries Kristie Pfosi, Senior Manager, Automotive Cyber Security, Mitsubishi Electric Automotive America (MEAA), will discuss the ...
Putting Cybersecurity in the C-Suite - How to Create and Run a Joint Cybersecurity Operations Center Dan Shoemaker Cybercrime is a $6 trillion a year industry. That is why organizations need a cyber ...
Advisory Council Lunch Roundtable: Protecting Your Company Data While Traveling Abroad-China? Barbara Hiemstra N/A
[LUNCH KEYNOTE] Radware: The 10 Immutable Security Facts for 2020 Ron Winward A presentation of top 10 security facts that will disrupt established application and infrastructure security ...
Penetrating Software Development Michael Muha Security is often second to features when it comes to software development priorities. Here’s some ...
Bring the Championship to the Midwest: Become a CyberPatriot Mentor! Tamara Sorensen This session will explain a way for hackers and cybersecurity professionals to pay-it-forward and volunteer ...
Zero Trust: The Elements of Strategy Wolfgang Goerlich Philosophies for securing technology has crashed over our industry in waves. Capability-based security locked down ...