SecureWorldTwinCities 2019 Oct. 16, 2019 to Oct. 16, 2019, Minneapolis, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Journey to the Cloud - Roadblocks, Pitfalls & Silver Linings Brent Lassi N/A
Out of the Box and Onto The Wire: The Insecurity of Healthcare IoT Jennifer Reicherts Are IoT devices leaving your hospital organization Eternally Blue and making you WannaCry? Hear from ...
The Power of an Identity Aware Security Strategy Carlos Garcia Identity meet security. Security meet identity. Despite the growing number of breaches related to compromised ...
World War “D”: The Unknown Consequences of Data, Global Compliance, Security, AI, and ML Christopher Rence At some point, every organization will be discussing how data is being used, what risks ...
Reporting to the Board - Using Metrics & KPIs Christopher Grillo N/A
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
[Insight] A Practical Approach to Securing Data Regardless of Where It Lives Jason Rader In this session, we will review the evolution of data in the enterprise, how we ...
Culture and Collaboration: How Working Together Builds the Bridge Between People, Process, and Technology Alexandra Panaretos Having worked in many different industries, company sizes, and employee populations as both a consultant ...
Hidden Leadership Talent: Is the Technology World Committing Leadership Suicide? Lynette Crane The Global Leadership Forecast of 2018 revealed that “finding next generation leaders” is what keeps ...
[Radware] Cybersecurity Pushed to the Limit Frank Leyva Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ...
[LUNCH KEYNOTE] Insider Threat Panel: Are We Giving this Security Risk the Attention It Deserves? Brent Lassi , Brian Bobo , Tammylynne Jonas , Michael Blaha What is insider threat? How can organizations ensure these risk areas are mitigated? Are there ...
[Panel] Cloudy With a Chance of Breach Brandon Reid , Jason Radar , Mike Kearn , Mike Olsen Everything old is new again. Migrating to the cloud certainly is not a new thing. ...
[Panel] Building a Better Mouse Trap (Emerging Threats) John Linzy , Adam Gates , Frank Leyva , Daniel Conrad , Kristi Thiele To be successful, as an industry, we must strive to get ahead of the bad ...
Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes Jack Freund Communicating risk to nontechnical people is difficult. As security professionals, we can recite the threats ...
Data Security and Data Privacy: The Laws and Regulations and Why Security and Privacy Are So Important Joshua Carlson Joshua Carlson works exclusively with companies on their data privacy and data security postures. Mr. ...
EPSS: Data-Driven Vulnerability Remediation Dr. Ben Edwards Keeping up with vulnerability remediation is a universal challenge experienced by every organization. The onslaught ...