DataConnectorsDenver 2020 Feb. 20, 2020 to Feb. 20, 2020, Denver, US
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
CISO Panel | Joshua Foltz , Michelle Vercellino , Jim Stephens , Richard Staynings , Erin Turoff , Scott Magerfleisch , Paula Kautzmann | N/A | |
Why Does Asset Management Matter for Cybersecurity? | Mikkel Hansen | Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to ... | |
Threat Intelligence and Modern Layered Security | Ted Gruenloh | The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does ... | |
Keynote Session: Trends in Cybercrime | Ike Barnes | Assistant to the Special Agent in Charge (ATSAIC) Ike Barnes is a graduate of the ... | |
Real talk on ransomware | Steve Nalick | We all know what ransomware is – we know the stats, we’ve seen the headlines, ... | |
The Paradox of Securing Workloads | Arthur Braunstein | Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ... | |
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data | Brad Beutlich | For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the ... | |
Overcoming Today’s Most Common Security & Privacy Challenges | Zach Reed | Managing third-party vendor risk before, during and after on-boarding is a continuous effort under global ... | |
Cybercrime, Inc: Exposing the Business of the Dark Web | Michael Mayes | The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service ... | |
Digital Transformation – Knowing the Threat Landscape | Craig Goodard | Digital Transformation is real. How prepared is your business to understand the associated risks within ... | |
A Risk Based Privacy Approach | Matthew Corwin | A privacy program in this environment must take into account: An understanding of what current ... |