SecureWorldDetroit 2019 Oct. 1, 2019 to Oct. 2, 2019, Detroit, US
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Social Media and Filter Bubbles: How People and Businesses Are Targeting Users | Tony Dancel | Social media sites are tracking user data and creating filtered user content, also known as ... | |
Addressing the Talent Gap in Secure Systems Engineering | Matthew Clapham | To get out of perpetual reaction mode, we need more professionals with systems engineering experience ... | |
IoT, a Legal Look: Identifying and Addressing Risks of Connected Devices | Kathy Ossian | The convenience of an increasing number of smart devices in our professional and personal lives ... | |
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense | Christopher Mcmahon | The average loss from a bank robbery is about $3,000. The average loss from a ... | |
Tribal Security: Leading and Empowering International Teams | Steven f. Fox | Managers tend to focus on the language, communication, and time zone challenges when working with ... | |
[Radware] Cybersecurity Pushed to the Limit | Ron Winward | Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ... | |
It’s Not Easy Being Blue: When Do Cyber Defenders Become Rock Stars? | Ryan Mostiller | Cyber Defenders, or members of the Blue Team, don’t often get chances to look like ... | |
[Trend Micro] What You Should Know About Container Security | Rob Maynard | Container adoption is growing. With new technologies come new threats and new things to think ... | |
Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes | Jack Freund | Communicating risk to nontechnical people is difficult. As security professionals, we can recite the threats ... | |
[Tenable] Seeing the Forest Through the Trees: A Risked-Based Approach to Maturing Your VMP | Rob Walk | Tenable products help you accurately identify, investigate and prioritize vulnerabilities. Secure your cloud, containers, OT ... | |
Advisory Council Lunch Roundtable: Vulnerability and Patch Management | Stephanie Scheuermann | N/A | |
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top | Mark Gelhardt | Do you have a plan for your future? Why not? You are the leader of ... | |
Panel: Building a Better Mouse Trap (Emerging Threats) | Matthew Gardiner , John Fatten , Ron Winward , Chris Burrows , Jams Honey | To be successful, as an industry, we must strive to get ahead of the bad ... | |
Panel: You Got Burned, Now What? (Incident Response) | Adam Gates , Gaurav Kulkarni , Gene Kingsley | We’ve all heard the adage that it’s not if it happens but when you are ... | |
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? | Matthew Clapham , Dennis Hodges , Zahira (zah) Gonzalvo , Scott Bennett | The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ... | |
Building a Daily Security Investigation Playbook | Marc Harwin | As Defenders of Corporate Networks, we are presented with a myriad of potential security data ... | |
[Mimecast] Phishing Isn't Phun: 10 Techniques to Address this Widely-Used Attack Vector | Matthew Gardiner | It is no secret that phishing in all its forms remains the #1 entry vector ... | |
WTH Is a Privacy Engineer? | Barbara Hiemstra | Until recently, this role didn’t exist (or was done by others under a different name). ... | |
Third-Party Risk: Creating and Managing a Program that Works! | David Barton | Every organization is concerned with third-party risk. No one wants to be the next Target ... | |
Culture and Collaboration: How Working Together Builds the Bridge Between People, Process, and Technology | Alexandra Panaretos | Having worked in many different industries, company sizes, and employee populations as both a consultant ... | |
[Panel] The Future of Transportation: Navigating the Automotive Cybersecurity Ecosystem | Amy Pfosi | This dynamic discussion features three of the leading voices in the automotive supply chain. This ... | |
[OPENING KEYNOTE] A Fireside Chat with Dr. Larry Ponemon | Dr. Larry Ponemon | Google the words “Ponemon Institute Research” and you’ll find more than a quarter-million results. Dr. ... | |
Advisory Council Roundtable: Converging all Aspects of the Cybersecurity Operation (Electronic, Physical and Personnel) | Dan Shoemaker | N/A | |
Building the 'Cyber 9-1-1' Hotline for US Victims of Online Crime | Kristin Judge | The Cybercrime Support Network (CSN) is working with federal, state, and local law enforcement and ... | |
[baramundi] Innovative Endpoint Management: A Security Baseline That Is Too Often Not Met | Holger Weeres | This session outlines some security and patch management basic issues that are often overlooked or ... | |
[Cisco] Malicious Cryptomining is Exploding - Are You at Risk? | John Fatten | With a 200x increase in crypto-related traffic in 2019, there’s never been a better time ... | |
Automotive Cyber Attack: A Perspective from the Driver's Seat | Kristie Devries | Kristie Pfosi, Senior Manager, Automotive Cyber Security, Mitsubishi Electric Automotive America (MEAA), will discuss the ... | |
Putting Cybersecurity in the C-Suite - How to Create and Run a Joint Cybersecurity Operations Center | Dan Shoemaker | Cybercrime is a $6 trillion a year industry. That is why organizations need a cyber ... | |
Advisory Council Lunch Roundtable: Protecting Your Company Data While Traveling Abroad-China? | Barbara Hiemstra | N/A | |
[LUNCH KEYNOTE] Radware: The 10 Immutable Security Facts for 2020 | Ron Winward | A presentation of top 10 security facts that will disrupt established application and infrastructure security ... | |
Penetrating Software Development | Michael Muha | Security is often second to features when it comes to software development priorities. Here’s some ... | |
Bring the Championship to the Midwest: Become a CyberPatriot Mentor! | Tamara Sorensen | This session will explain a way for hackers and cybersecurity professionals to pay-it-forward and volunteer ... | |
Zero Trust: The Elements of Strategy | Wolfgang Goerlich | Philosophies for securing technology has crashed over our industry in waves. Capability-based security locked down ... |