SecureWorldDenver 2019 Oct. 29, 2019 to Oct. 30, 2019, Denver, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Who's Your Hacker? ... And Why It Matters Siam Luu Because no organization is 100% unhackable, organizations establish “acceptable” levels of risk. We then build ...
Using Vault to Better Protect Your Secrets Bryce Verdier All developers have seen it and few will admit to doing it. Putting unprotected authentication ...
Part 1: CISA: What You Should Know and How to Access New Resources to Protect Your Organization David Sonheim The threats and threat actors facing our nation are becoming more complex than any point ...
Part 2: Overview of the FBI’s Private Sector Outreach Program Christopher Calarco Learn about the FBI’s Private Sector Outreach Program, including the FBI’s Infragard program. We will ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
3rd Party Risk - Creating & Managing a Program that Works Sam Masiello N/A
Panel] Knowledge Is Power: Women in Cybersecurity Cindi Carter , Mary Haynes , Aleta Jeffress , Jessica Raymond N/A
Cybersecurity Pushed to the Limit Ron Winward Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ...
Threat Intelligence - The Humans, The SIEMs, and the Analytics John Callaghan The landscape of SOC .vs. Threat has become a game of brinkmanship and 7/24 risk. ...
Security Workforce - Staffing/Retention, Fair Wages, Outsourcing Rhett Saunders N/A
7 Ways To Boost InfoSec’s Influence (and Yours) by Communicating Differently Bruce Sussman Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by ...
[Panel] Building a Better Mouse Trap (Emerging Threats) session level icon Ron Winward , Mark Lindgren , David Wolpoff To be successful, as an industry, we must strive to get ahead of the bad ...
[Panel] Cloudy With a Chance of Breach Bruce Potter , Rhett Saunders , Jeff Frier , Jay Wilson Everything old is new again. Migrating to the cloud certainly is not a new thing. ...
Cyber AI: Fighting Back with Autonomous Response Jesse Hood The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ...
Third-Party Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges Jaymin Desai Managing third-party vendor risk before, during and after onboarding is a continuous effort under global ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? Sam Masiello , Christopher Mandelaris , Clint Sowada The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ...
Building a Cybersecurity Program: Lessons Learned from a New CISO Randall Frietzsche The first few years in a CISO role can offer unique challenges and opportunities. Gain ...
Shared-VPCs, a Cloud Security Architecture Joe Dietz The seminar will cover a cloud architecture related to creating Shared VPCs in major cloud ...
How Privacy and Security Work Together Janelle Bukaty Security and privacy professionals can build more trust within the organization when they work together ...
Industrial Security: Bridging the Gap Between OT and IT Chris Reynolds Industrial Control Systems (ICS) are becoming a bigger part of our manufacturing operations and yet ...
[OPENING KEYNOTE] The Colorado = Security Podcast LIVE Robb Reck , Alex Wood , Dale Drew Come hear Colorado’s #1 security podcast live on the SecureWorld Denver keynote stage! Join podcast ...
A Tactical Discussion – Dividing the Big Picture into Short-Term Wins Jay Wilson N/A
[Panel] Discussion with Huawei’s VP of Risk Management: A Supply Chain Security Case Study Craig Danks Is Huawei a trade war target or a security risk? Regardless, the Huawei accusations by ...
Get a Grip on Cloud Security: How to Lasso and Protect Your Cloud-Based Data and Apps Bruce Potter The cloud is a new frontier, and—just like in those old westerns—it sometimes seems lawless. ...
Consumer Rights and Business Responsibilities David Stauss When the California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020, privacy ...
Manage Vulnerabilities Like a Pro: How to Take Your Vulnerability Management Program to the Next Level Serge Borso At an organizational level, we all have assets and these assets all have vulnerabilities. Most ...
Reporting to the Board – Using Meaningful Metrics in a Language we ALL Can Understand Greg Sternberg N/A
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top Mark Gelhardt N/ADo you have a plan for your future? Why not? You are the leader of ...
[Panel] You Got Burned! Now What? (Incident Response) John Linzy , Jason Teplitz , Stephen Swansow We’ve all heard the adage that it’s not if it happens but when you are ...
[Privacy Panel] A Solution Stack Ideation Jaymin Desai , Burak Serdar , Monica Dubeau A solution stack focuses on the emerging technologies that businesses need to evaluate in order ...
[Panel] Cybersecurity Leaders on Privacy Merlin Namuth , Alex Wood , Christopher Riley , Brenden Smith , Michael Stephen , Justin Schluessler This session will enable attendees to learn about what privacy elements are important for local ...
IPv6 Security: The Latent Threat Scott Hogg Many organizations already have IPv6 networks, some organizations are working on their transitions to IPv6 ...
Surviving and Thriving in the Internet Wild - Cybersecurity With a Shoestring! Craig Swinteck In a survival situation, you have incredibly limited resources and manpower. This mirrors the case ...