SecureWorldCharlotte 2020 March 4, 2020 to March 5, 2020, Charlotte, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Setting Common Language When Talking to Leadership About IT Risks Rick Doten To be successful in presenting IT security to senior leadership, it’s important it is done ...
Third-Party Risk: Creating and Managing a Program that Works! David Barton Every organization is concerned with third-party risk. No one wants to be the next Target ...
The Hunt for Cybersecurity Talent: It's Time to Rethink Your Organization's Recruitment Strategy Matt Donato Thousands of organizations across the globe are experiencing “hunt fatigue” when it comes to finding ...
[OPENING KEYNOTE] Living in a Resilient World Tammy Moskites With over 25 years in Security and Technology and a Career CISO, Tammy Moskites, CEO ...
Advisory Council Roundtable: Prioritizing Risk in an Ever Changing Threatscape N/a N/A
ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net Mike Muscatell We always hear about the “Dark Web” and how various services advertise the use of ...
[Attack]tive Directory: Compromising Domains via Active Directory Exploits in 2020 Ryan Hausknecht As a red teamer and penetration tester, I’ve compromised several networks from small/medium businesses to ...
Protecting You from You Is the #1 Challenge in the Age of SDE (Software Defined Everything) Grant Asplund Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the ...
SOCs Stink? N/a The traditional SOC model employed by many organizations provides questionable efficacy at an ever increasing ...
LUNCH KEYNOTE: Executive Leadership Panel: Topic: Establishing and Evaluating Effective Cybersecurity Programs Mike Brannon , Ben Schwering , Joel Lowe N/A
Offensive AI vs. Defensive AI: Battle of the Algorithms session level icon Melisa Ozcan Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ...
[Panel] Emerging Threats – Hackers and Exploits and Phishing Attacks! Oh My! Jason Rader , Franco Negri , Miles Martin , Juan Marin We all have heard email is the #1 attack vector. Based on the numbers we ...
[Panel] The Current Threatscape - A Top 5 List Matt Rose , Tom Utley , Justin Bourgeois , Steve Gyurindak , Matt Fryer Scammers are getting inventive. They are doing their homework. They use social media and Open ...
Cloud Security: Securing Your Organization’s Digital Transformation James Asplund What are the security issues that keep you up at night? Connect with peers who ...
Responding to the Evolving Privacy Landscape Mike Brannon N/A
Securing Your (SD)-WAN Journey to Your Cloud Michael Butterfield SD-WAN has evolved through three main stages to meet the business needs of its users. ...
Penetration Testing The Cybersecurity Maturity Model (CMM) Mike Muscatell Many organizations have heard or used the Cybersecurity Maturity Model (CMM) to help improve their ...
Corporate Threat Actor Psychological Profiles: Towards a Formal Ontology for Automatic Detection of Psychological Risk Factors Tam Nguyen Human psychology plays an important role in organizational performance. However, understanding our employees is a ...
Building a Cybersecurity Program Andrew Dutton Smaller organizations and first time program leads often struggle with the building blocks of a ...
Pandemic Planning: What Security Professionals Need to Know Stephen Head Managing operational resilience in today’s digital environment is extremely challenging, whether your organization is public, ...
Connected Devices Need Connected Teams Lisa Tuttle IoT security is a growing concern as the number of connected devices increases. California, Oregon ...
[OPENING KEYNOTE]: The Cyberlous Mrs. Maisel: A Comedic (and Slightly Terrifying) Introduction to Information Warfare J. Smith Like a dear family relative who won’t stop talking at Thanksgiving dinner, a backdoor exploit ...
Prioritization of Top 20 Critical Security Controls N/a N/A
CISO's Guide to Proactive Breach Mitigation Using Threat Intelligence Juan Marin Juan Marin, Sales Engineer Manager at IntSights will take you on a tour of the ...
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready? Katie Hoover To achieve better security across the US DIB supply chain, the DoD is developing the ...
How Prepared Is Your Organization for a Ransomware Attack? Douglas Sudlow While ransomware has become the new exploit of choice for adversaries, these attacks can usually ...
The Cyber Resilience Imperative and the Role of Pervasive Email Security Justin Bourgeois Security breaches, data leaks, and email-based attacks are a real threat to your organization. How ...
[LUNCH KEYNOTE] Panel — Securing Democracy: Defending Our Votes in an Era of Cyber Warfare Torry Crass , Karen Brinson Bell , Michael Dickerson , Brian Neesby N/A
[Panel] Incident Response – Clean up on Aisle 9. Bring a Mop! Grant Asplund , Mark Stanford , Tom Tollerton , Oscar Minks , Allen O'rourke Just about every week we hear about some new breach, attack, scheme, etc. Sadly, it’s ...
Career Development: Becoming a CISO Rob Dalzell N/A
Communicating to the Board Jack Freund N/A
Maturing a Cybersecurity Program Andrew Dutton Whether you are a small organization, single person on a cybersecurity team or inheriting a ...
Are You Ready for the Convergence of IIoT, OT, and IT Security? Dr. John Opala N/A