SecureIowaConference 2019 Oct. 8, 2019 to Oct. 8, 2019, Ankeny, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
DFIR Redefined: Deeper Functionality for Investigators Russ Mcree Those of us who operate within the constructs of digital forensics and incident response understand ...
Accessing, securing, and managing your Cloud Apps is a nightmare! But there is a way! Kyle Ward Enterprises looking to scale the deployment of cloud and web apps across the organization encounter ...
Quantifying Cyber Risk: Translating bits and bytes to dollars and cents Vince Dasta This session will demystify the topic of cyber risk quantification by explaining the fundamental principles ...
Zero Trust with Micro-Segmentation: Doing It the Right Way Mac Grant In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their ...
Adventures with Podman and Varlink Jeremy Brown With the 'rise of containers' comes also the rise of container platforms. And while Docker ...
Cybersecurity: A Business Strategy Denny Fisher Cybersecurity has long been disconnected from the whole of the organization. As the threat landscape ...
Pseudorandom Meta Threat Intelligence TL;DR - Lessons Learned from the Verizon Data Breach Investigation Report Walter Abeson You’ve heard about it, you’ve seen it cited, you may have even printed it, but ...
Data Breaches: Definitions, Threats, and Statistics Robert (bob) As cyber security threats continue to increase and businesses are the target, businesses should be ...
Network Data: Powering the Modern SOC Tom Roeh Two pillars of a successful and proactive SOC are threat hunting and incident response. The ...
A Breach of Data or Breach of Trust: Communicating with Consumers during Cyberattacks Eileen Wixted As companies collect more information on customers, the risks associated with potential data exposure grow ...
Identity Defined Security: Zero Trust on the Endpoint Dan Graney Bringing Zero Trust to the EndpointEndpoint security products secure and collect data on the activity ...
Chasing BEC Criminals John Wilson The continued evolution of business email compromise, spear phishing, and other advanced email threats is ...
Threat Management in the Modern Data Center Jc Lambright Oh how far the data center has come. Today’s data center is more than just ...
Trust in Your Business: Panel Discussion Dave Nelson , Steve Gilmer , Clint Nielsen In the age of "Fake Everything" does Trust still have a place in the business ...
Playbooks for the Collective Defense of Nations, Cities, and Critical Infrastructure Sectors in Cyberspace Greg Conti The veneer of modern civilization is thin and brittle. Given sufficient will, it is disturbingly ...
Missing Holes: What a WWII mathematician can teach us about the value of a quality penetration Zach Zaffis What do planes, a German emigrated Jewish mathematician, defensive cyber security, a classified WWII program, ...
Self Sovereign Identity, the Enterprise and Beyond Eric Vinton How Blockchain Technology is transforming Identity Management and the Enterprise benefits of leveraging these new ...
Quantum Day of Reckoning Roger A. Grimes Quantum computing is getting ready to break all traditional public key crypto, like RSA and ...