DataConnectorsOmaha 2019 Oct. 24, 2019 to Oct. 24, 2019, Omaha, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
CISO Panel | Matt Morton , Norman Kromberg , Michael Kearns , Frank Reid , Jason Rance , Jennifer Hunt | N/A | |
Dynamic Entity Modeling – A Behavioral Approach to Network Security | Andrew Flippin | Today, most network-monitoring approaches rely on traditional packet inspection methods, log files, or event information. ... | |
How to Virtualize, Supercharge and Augment your Firewalls on a Network Functions Platform using advanced technology to achieve superior results. | Michael Stewart | Mike will discuss how the results are obtained using technology that can be implemented on ... | |
Outcomes Based Approach through Cyber Security Leadership | Simon Puleo | What if by looking at the result first, programmers realized they need to bake security ... | |
High-Margin, Low-Maintenance: Reselling Native Office 365 Email Security | Romain Basset | Harvesting Microsoft Office 365 credentials is now the most profitable activity for cybercriminals. That’s why, ... | |
FBI Cyber Threat Briefing – Cyber Threats, Investigations, and Security | Sa Jacob Foiles | A discussion of current and emerging cyber threats, cyber security, and the FBI’s investigation of ... | |
Using Machine Learning for Risk Based Authentication | Brian Krause | The future of security revolves around security automation and machine learning. While this sounds nice ... | |
Real talk on ransomware | Gary Sussman | We all know what ransomware is – we know the stats, we’ve seen the headlines, ... | |
Powerful Security. Operationally Simple | Arthur Braunstein | Most breaches happen on the endpoint and advanced evasive threats pose the biggest risk, causing ... |