SecureWorldDenver 2019 Oct. 29, 2019 to Oct. 30, 2019, Denver, US
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Who's Your Hacker? ... And Why It Matters | Siam Luu | Because no organization is 100% unhackable, organizations establish “acceptable” levels of risk. We then build ... | |
Using Vault to Better Protect Your Secrets | Bryce Verdier | All developers have seen it and few will admit to doing it. Putting unprotected authentication ... | |
Part 1: CISA: What You Should Know and How to Access New Resources to Protect Your Organization | David Sonheim | The threats and threat actors facing our nation are becoming more complex than any point ... | |
Part 2: Overview of the FBI’s Private Sector Outreach Program | Christopher Calarco | Learn about the FBI’s Private Sector Outreach Program, including the FBI’s Infragard program. We will ... | |
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense | Christopher Mcmahon | The average loss from a bank robbery is about $3,000. The average loss from a ... | |
3rd Party Risk - Creating & Managing a Program that Works | Sam Masiello | N/A | |
Panel] Knowledge Is Power: Women in Cybersecurity | Cindi Carter , Mary Haynes , Aleta Jeffress , Jessica Raymond | N/A | |
Cybersecurity Pushed to the Limit | Ron Winward | Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ... | |
Threat Intelligence - The Humans, The SIEMs, and the Analytics | John Callaghan | The landscape of SOC .vs. Threat has become a game of brinkmanship and 7/24 risk. ... | |
Security Workforce - Staffing/Retention, Fair Wages, Outsourcing | Rhett Saunders | N/A | |
7 Ways To Boost InfoSec’s Influence (and Yours) by Communicating Differently | Bruce Sussman | Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by ... | |
[Panel] Building a Better Mouse Trap (Emerging Threats) session level icon | Ron Winward , Mark Lindgren , David Wolpoff | To be successful, as an industry, we must strive to get ahead of the bad ... | |
[Panel] Cloudy With a Chance of Breach | Bruce Potter , Rhett Saunders , Jeff Frier , Jay Wilson | Everything old is new again. Migrating to the cloud certainly is not a new thing. ... | |
Cyber AI: Fighting Back with Autonomous Response | Jesse Hood | The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ... | |
Third-Party Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges | Jaymin Desai | Managing third-party vendor risk before, during and after onboarding is a continuous effort under global ... | |
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? | Sam Masiello , Christopher Mandelaris , Clint Sowada | The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ... | |
Building a Cybersecurity Program: Lessons Learned from a New CISO | Randall Frietzsche | The first few years in a CISO role can offer unique challenges and opportunities. Gain ... | |
Shared-VPCs, a Cloud Security Architecture | Joe Dietz | The seminar will cover a cloud architecture related to creating Shared VPCs in major cloud ... | |
How Privacy and Security Work Together | Janelle Bukaty | Security and privacy professionals can build more trust within the organization when they work together ... | |
Industrial Security: Bridging the Gap Between OT and IT | Chris Reynolds | Industrial Control Systems (ICS) are becoming a bigger part of our manufacturing operations and yet ... | |
[OPENING KEYNOTE] The Colorado = Security Podcast LIVE | Robb Reck , Alex Wood , Dale Drew | Come hear Colorado’s #1 security podcast live on the SecureWorld Denver keynote stage! Join podcast ... | |
A Tactical Discussion – Dividing the Big Picture into Short-Term Wins | Jay Wilson | N/A | |
[Panel] Discussion with Huawei’s VP of Risk Management: A Supply Chain Security Case Study | Craig Danks | Is Huawei a trade war target or a security risk? Regardless, the Huawei accusations by ... | |
Get a Grip on Cloud Security: How to Lasso and Protect Your Cloud-Based Data and Apps | Bruce Potter | The cloud is a new frontier, and—just like in those old westerns—it sometimes seems lawless. ... | |
Consumer Rights and Business Responsibilities | David Stauss | When the California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020, privacy ... | |
Manage Vulnerabilities Like a Pro: How to Take Your Vulnerability Management Program to the Next Level | Serge Borso | At an organizational level, we all have assets and these assets all have vulnerabilities. Most ... | |
Reporting to the Board – Using Meaningful Metrics in a Language we ALL Can Understand | Greg Sternberg | N/A | |
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top | Mark Gelhardt | N/ADo you have a plan for your future? Why not? You are the leader of ... | |
[Panel] You Got Burned! Now What? (Incident Response) | John Linzy , Jason Teplitz , Stephen Swansow | We’ve all heard the adage that it’s not if it happens but when you are ... | |
[Privacy Panel] A Solution Stack Ideation | Jaymin Desai , Burak Serdar , Monica Dubeau | A solution stack focuses on the emerging technologies that businesses need to evaluate in order ... | |
[Panel] Cybersecurity Leaders on Privacy | Merlin Namuth , Alex Wood , Christopher Riley , Brenden Smith , Michael Stephen , Justin Schluessler | This session will enable attendees to learn about what privacy elements are important for local ... | |
IPv6 Security: The Latent Threat | Scott Hogg | Many organizations already have IPv6 networks, some organizations are working on their transitions to IPv6 ... | |
Surviving and Thriving in the Internet Wild - Cybersecurity With a Shoestring! | Craig Swinteck | In a survival situation, you have incredibly limited resources and manpower. This mirrors the case ... |