RochesterSecuritySummit 1969 Oct. 2, 1969 to Oct. 3, 1969, Rochester, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Johnny Xmas , Reg Harnish , F. Paul Greene N/A
Practical Incident Response: An Interactive Tabletop Exercise John Iii , Bruce Cheney , Chandra Whitley , Jenny Holmes N/A
Perspectives on Establishing “Cyber Confidence” Tom Podnar N/A
Leveling Up Your Entire Security Program (Not Just DFIR) With ATT&CK Bob Rudis N/A
SOC Analyst for a Day Joe Pizzo N/A
Anatomy of a Cyber Attack Varonis N/A
Modernizing IT: Securing Identities and Data When Moving to the Cloud Okta N/A
Planning Successful Red Team Operations Joe Christian N/A
Lessons from the Orange Book David Frier N/A
App-abet Soup – should you DAST, SAST or RASP? Rapid7 N/A
BlackBerry Cylance N/a N/A
Establishing an Incident Response Plan Michael Mccartney N/A
A Theme of Fear: Hacking the Paradigm Dr. Ullman N/A
Data Privacy is a Human Right Jason Woodson N/A
Secure by Design; Not Regret Iv4 / Qualys N/A
Zero Trust Logrhythm N/A
Business Continuity & Disaster Recovery Interactive Tabletop Presentation Carl Jayakumar N/A
We’re All Winners: Gamification and Security Awareness Ben Woelk N/A
Cyber-Physical Safety Duncan Sparrell N/A
Solving Problems Tools Can’t Guidepoint Security N/A
10 Features of a Modern SIEM Exabeam N/A
Secure Your Web Apps by Training Developers to Break Them Jim Keeler N/A
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning Matthew Wright N/A
Smartphone security evaluation in the era of Big Data Igor Reznik N/A
Threat Hunting Challenge Eric Ayotte N/A
Cybersecurity: Ground Zero Igi N/A
Breach and Attack Simulation and the Dirty Dozen TTPs Attackiq N/A
Supercharge your SOC with 3 Killer Threat Hunting Use Cases Patrick Keenan N/A
Endpoint Visibility with Osquery and Loki George Welch N/A
Protect Your Business with Security Delivered from the Cloud Palo Alto Networks N/A
InProgress Attack? Detect, Disrupt and Block with CyberArk & Proofpoint! N/a N/A
Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows Ralph Durkee N/A
The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive Matthew Gracie N/A
Kubernetes Security Tools and Pentesting Methodology Mark Manning N/A
Digital Forensics vs. Incident Response – When to Stop Investigating and Start Recovering Greycastle Security N/A
Encrypted Things: Network Detection & Response in an Encrypted World Gigamon N/A
Supercharged SIEM: Empowering your logs with the right data Tom Kopchak N/A
PErfidious: Make PE backdooring great again! Shreyans Devendra Doshi N/A
Taking Security Visibility Beyond SIEM: Data Analytics and Security Automation Sirius N/A
The 1/10/60 Minute Challenge: A Framework For Stopping Breaches Faster Crowdstrike N/A
Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (cont.) Ralph Durkee N/A
Threat Hunting: The Incredible Journey Zach Bevilacqua N/A
How to harden a medical device – It’s easier than you think Dan Megalo N/A