SecureWorldSeattle 2019 Nov. 13, 2019 to Nov. 13, 2019, Seattle, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Legal Post-Mortem: What Did the Lawyers Learn From a Ransomware Attack? Jake Bernstein N/A
What You Know, We Know: How Your PII Isn't Secure Enough to Be Called Personal Anymore Abigail Mcalpine PII authentication has been used everywhere to authenticate your identity with various service providers, but ...
How to Leverage Leadership Style to Improve Your Security Posture William Lidster Noncompliance to information security policies and standards remains the primary root cause of breaches for ...
The Two Faces of Artificial Intelligence Annie Searle Artificial intelligence (AI) has been with us since 1965, when a computer figured out how ...
Fortifying Your Enterprise In a Changing Security & Privacy Landscape Kenneth Olmstead Recent multi-million dollar sanctions for data breaches show that businesses cannot afford to be lax ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
Securing the Cloud Mukesh Dixit N/A
Data Laundering, Exploitation, and Extortion: Time for Ethical AI Craig Spiezle We are facing seismic change with the convergence of big data and AI. The oceans ...
[Trend Micro] XDR and Closing the Gap on Disparate EDR Approaches Craig Schippers Endpoint Detection and Response (EDR) alone has failed to provide a complete painting of the ...
[Panel] Women in Security: Looking to the Future Vanessa Pegueros , Annie Searle , Ann Nagel , Melissa Van Buhler N/AN/A
A Survey of U.S. Domestic Security and Privacy Laws: The Evolving Landscape Jordan Fischer The U.S. legal framework for cybersecurity and data privacy continues to evolve, trying to stay ...
Cybersecurity Pushed to the Limit Ron Winward Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ...
Approaches to Staffing a Security Operations Center – Focus on Outsourcing One or More Aspects of the Function. Michael Ray N/A
7 Ways To Boost InfoSec’s Influence (and Yours) by Communicating Differently Bruce Sussman Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by ...
Threat Landscape in Flux: Emerging Threats Austin Mcbride Amidst the ever-evolving threat landscape, 2018 was a particularly nasty year that saw an increased ...
Panel: Building a Better Mouse Trap (Emerging Threats) Ron Winward , Myla Pilao , Prasidh Srikanth , Justin Hang , James Mccarthy To be successful, as an industry, we must strive to get ahead of the bad ...
You Got Burned, Now What? (Incident Response) Scott Giordano , Brad Pierce , Robert Statsinger We’ve all heard the adage that it’s not if it happens but when you are ...
Cloud Security: Securing Your Organization’s Digital Transformation Gene Kingsley What are the security issues that keep you up at night? Connect with peers who ...
Responding to the Evolving Privacy Landscape Melissa Van Buhler What are the security issues that keep you up at night? Connect with peers who ...
Insider Threat Tom Bechtold N/A
Communicating to the Board Sean Ventura What are the security issues that keep you up at night? Connect with peers who ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? Ashish Popli , Garrett Whitney , Karen Holmes , Stephen Purpura The number of cyber startups is growing exponentially, with 4300+ cybersecurity companies worldwide including several ...
Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes Jack Freund Communicating risk to nontechnical people is difficult. As security professionals, we can recite the threats ...
Bias in AI: The Risk and the Reality Brian Cady Bias generates risk in all AI systems, but how serious is the problem? This session ...
Attack Vectors, New and Old: How Hackers Bypass Office 365, and Why They’ll Start Targeting Slack Jeff Raymond The scale of migration to the cloud requires a strategic shift in collaboration security suites. ...
Being Smart About Intelligence Janet Lawless Adversaries are sophisticated, clever, motivated and highly focused. Attacks are well planned, coordinated and use ...
Human Resilience in Our Cybersecurity Culture Samantha Dutton As employers struggle attracting and retaining cybersecurity personnel, it is important to note that employees ...
Zero Trust: The Elements of Strategy Wolfgang Goerlich Philosophies for securing technology has crashed over our industry in waves. Capability-based security locked down ...
The New "Colder" War: Cybersecurity Threats Against Consumer Privacy and Our Democratic Institutions Kevin J. Murphy Modern cybersecurity threats have evolved into very effective disinformation campaigns based on what they know ...
[OPENING KEYNOTE] How to Manage Your Own Career to Get to the Top Mark Gelhardt Do you have a plan for your future? Why not? You are the leader of ...
Building an Effective Security Awareness Program Jeanette Torseth What are the security issues that keep you up at night? Connect with peers who ...
Career Development: Becoming a CISO Barbara Endicott-popovsky N/A
Supply Chain Security Brian Shea What are the security issues that keep you up at night? Connect with peers who ...
The Scope of Pen Testing Mukesh Dixit N/A
Threat Modeling 2019 Adam Shostack Interested in your local associations? Join Cloud Security Alliance (CSA) for a chapter meeting and ...
[Panel] Discussion with Huawei’s Chief Security Officer: A Supply Chain Security Case Study session level icon Craig Purdy Is Huawei a trade war target or a security risk? Regardless, the Huawei accusations by ...
Changes to Washington's Data Breach Laws Jerry Vergeront Washington State has recently passed a bill that will drastically change the data breach notification ...
DHS Cybersecurity Advisor on Risks, Best Practice Recommendations, and Available No-Cost Resources Ronald Watters The DHS CISA Cybersecurity Advisor will speak to cyber threats and risks, then provide some ...
Building a Cybersecurity Program from Scratch Andrew Dutton Building a successful cybersecurity program is not easy. It is often difficult to build a ...
Addressing the Talent Gap Barbara Endicott-popovsky N/A
[LUNCH KEYNOTE] Radware: The 10 Immutable Security Facts for 2020 Ron Winward A presentation of top 10 security facts that will disrupt established application and infrastructure security ...
Panel: Shifting Landscape of Attack Vectors session Dr. mike Lloyd , Michael Hiskey , Wayne Tynes , Corey Smith If one thing holds true in cybersecurity it is the fact that our adversaries are ...
Panel: Cloudy with a Chance of Breach Grant Asplund , Robert Statsinger , Jesse Houldsworth , David Nicholson , Mark Hamilton Everything old is new again. Migrating to the cloud certainly is not a new thing. ...
[OneTrust] CCPA: 5-Step Guide to California Consumer Privacy Act Compliance Ethan Sailers With the clock ticking down until the California Consumer Privacy Act (CCPA) comes into effect ...
Beyond the Security Awareness Check Box Jeanette Torseth It’s time to move beyond the “Awareness” messaging campaigns and the annual compliance training check ...
Role of Information Risk and Compliance in Digital Healthcare N/a This presentation focuses on some of the key attributes to take into consideration for creating ...
The Reasonableness Standard for Cybersecurity: What Is It and How Do We Meet It? Jake Buhler The Federal Trade Commission is no longer the only sheriff in town when it comes ...