SecureWorldDallas 2019 Oct. 9, 2019 to Oct. 10, 2019, Dallas, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How Mature is Your Cybersecurity Incident Response Plan? N/a N/A
SecureWorld PLUS Part 1 - Building an Incident Response Plan from Scratch: If It's Not Written Down, You Don't Have a Plan! Mary Chaney In today’s world not knowing how your company will respond when it has a breach ...
Banking Data Breach and Lessons Learned Eddie Ho Your financial institution has been hacked and is now on the evening news. Customers, board ...
Let's Stop Admiring the Human Factor Problem in Cybersecurity Calvin Nobles Ninety-five percent of all cyber-attacks are human enabled. Organizations continue to fail at addressing human ...
Fortifying Your Enterprise in a Changing Security and Privacy Landscape Jeff Wilbur Recent multi-million dollar sanctions for data breaches show that businesses cannot afford to be lax ...
Who Is Responsible for Security in the Cloud? Bill Meredith Examine some of the data exposure incidents over the past two years as a result ...
Piloting Through Cybersecurity Patrick Benoit Piloting through Security – Using pilot skills and techniques to secure your world against cyber ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
Securing the Cloud Bill White What are the security issues that keep you up at night? Connect with peers who ...
The Human Threat Calvin Nobles What are the security issues that keep you up at night? Connect with peers who ...
Communicating Between Technical and Non-Technical Teams Dominick Frazier What are the security issues that keep you up at night? Connect with peers who ...
Prioritization of the Top 20 Critical Security Controls N/a N/A
The Fluid Ecosystem of Risk Management Paola Saibene Join us to continue to hone in the skill of reducing the fragmented efforts of ...
Non-Traditional InfoSec Challenges: Risks and Protection Strategies Ian Schneller In this presentation, we will first explore a set of commonly used technologies that may ...
Word on the Street Is: A Lil' Bit of Awareness Will Make It Secure Dominick Frazier Security awareness is often viewed as this intangible part of information security that is always ...
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top Mark Gelhardt Do you have a plan for your future? Why not? You are the leader of ...
[Panel] Building a Better Mouse Trap (Emerging Threats) session level icon James Carnall , Kristi Thiele , Charity Wright , Christopher Marcinko , Michael Schindler To be successful, as an industry, we must strive to get ahead of the bad ...
You’ve Got Burned! Now What? Pat Benoit , Jon Allen , Jonathan Tock , Thomas Moore We’ve all heard the adage that it’s not if it happens but when you are ...
Establishing a Value Mandate for Risk Professionals Paola Saibene What are the security issues that keep you up at night? Connect with peers who ...
Communicating to the Board Ian Schneller What are the security issues that keep you up at night? Connect with peers who ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? Gaurav Kapil , Robert Walden , Drew Simonis , Anand Singh The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ...
[Panel] Knowledge Is Power: Women in Cybersecurity Amna Siddiqui , Cindi Carter , Diana Hennel , Tianne Strombeck N/A
When Does a Data Theft Incident Qualify as a Reportable Data Breach? Kelce Wilson Upon discovering that a data theft incident has occurred, a significant question arises: Is there ...
Securing the Public Cloud: Automation Bill White The largest cause of publicly disclosed security breaches in cloud environments continues to be poor ...
SecureWorld PLUS Part 2 - Building an Incident Response Plan from Scratch: If It's Not Written Down, You Don't Have a Plan! session level icon Mary Chaney In today’s world not knowing how your company will respond when it has a breach ...
SecureWorld PLUS Part 3 - Building an Incident Response Plan from Scratch: If It's Not Written Down, You Don't Have a Plan! session level icon Mary Chaney In today’s world not knowing how your company will respond when it has a breach ...
Considering a Continuity Plan? Michael Carpenter Your organization is required to implement a continuity plan but they can be complex and ...
Developing and Implementing an Effective Security Awareness Program Lessons Learned from an Oil and Gas Exploration Company Pedro Serrano Pedro will discuss his lessons learned in security awareness. He works in a very traditional ...
[OPENING KEYNOTE] Everything You Wanted to Know About a Ransomware Attack, but Were Afraid to Ask Mark Nagiel This presentation will focus on lessons learned from a real ransomware attack and what to ...
Responding to the Evolving Privacy Landscape Shawn E. Tuma What are the security issues that keep you up at night? Connect with peers who ...
Career Development: Becoming a CISO Pedro Serrano What are the security issues that keep you up at night? Connect with peers who ...
Breach Management Eddie Ho What are the security issues that keep you up at night? Connect with peers who ...
Privacy Versus Security (CCPA, GDPR, DevOpsSec) N/a N/A
The Legal Component of Incident Response Jeremy Rucker Legal obligations attach when a data privacy or security incident occurs. An important component to ...
Cyber Insurance: Safety Net or Scam? Mark Langford Cyber liability insurance was conceived to help organizations recover from the devastating effects of a ...
Strategically Reporting to the Board of Directors Dr. Weaver This presentation will cover three major areas of concerns when developing reporting for the board ...
Third-Party Cyber Risk: Creating and Managing a Program that Works Kc Condit Two-thirds of all major data breaches can be traced to an external third party of ...
Zero Trust, What’s the Big Deal? N/a N/A
[LUNCH KEYNOTE] Why Teams, Strategies, and Processes Are Essential for Managing Cyber Risk Shawn E. Tuma In twenty years of practicing cyber law, Shawn Tuma has seen a multitude of real-world ...
[Panel] Shifting Landscape of Attack Vectors Luis Rodriguez , Matt Rose , Peter Peter Tomaszewski , Chris Mears If one thing holds true in cybersecurity it is the fact that our adversaries are ...
Compliance Strikes Again Jp Hill Many organizations are struggling to implement cyber security. There are several factors causing these shortcomings. ...
Time to Get Re-Married: Turns Out, Privacy and Cybersecurity Are Still in Love! Mary Chaney Cybersecurity and privacy have been divorced for some time now, with organizations splitting responsibilities: cyber/information ...