SecureWorldBoston 2020 July 15, 2020 to July 15, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: Exposing The Dark Overlord: An Inside Look at the Journey that Led to the Identification of Cyber Terrorists session level icon Vinny Troia The Dark Overlord is considered to be one of the world’s most well-known hacking groups ...
Vendor Risk Management: Overcoming Today’s Most Common Challenges Achint Sehgal Managing vendor risk before, during and after procurement is a continuous challenge that organizations of ...
Panel Discussion: What Our Security Team Learned During COVID-19 Esmond Kane , Ravi Thatavarthy , Erika Barber , Gillian Lockwood N/A
Courting the Cloud: It's Time for a Commitment Michael Lopez What is your commitment to the Cloud? Find out where you are and where you’re ...
New Remote Workforce: Privacy and Security Risks and Mitigations Rebecca Rakoski The sudden growth in the remote workforce exposed critical cybersecurity and privacy concerns that should ...
Darktrace: Changing Cyber Landscapes: The Battle of Algorithms Sabrina Stanich Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ...
Leveraging Culture to Optimize Information Don Mckeown To build a culture that optimizes security, an organization needs to set information security leadership ...
Panel: No Perimeter: Security in the Cloud Mike Lloyd , Matthew Gardiner , Marc Ybarra , Marc Keating , Richard Schunk Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an ...
Mid-Day Keynote: Tracking Down the Cyber Criminals: Revealing Malicious Infrastructures with Umbrella Adam Winn Cyber criminals are exploiting the internet to build agile and resilient infrastructures. The internet is ...
Hey, Information Security: Be Part of the Digital Transformation or Be Left Behind! Sandy Silk “Digital transformation” (Dx) as a buzzword may be approaching the end of its life, but ...
Leveraging the Three Lines of Defense to Improve Your Security Position Brendan Campbell Depending on your role, a three lines of defense risk management model can be your ...
Panel: Addressing Weakness: Vulnerability Management Kevin Romero , James Sheldrake NIST defines vulnerabilities as, “Weakness in an information system, system security procedures, internal controls, or ...
Blue-Teaming and Incident Response for the "Win" Roy Wattanasin Does your company use Windows or is most of the environment Windows? Come to this ...
Ethical Hacking and Cyber Ecosystems: Anticipating the Predators Lauren Provost In an ever-evolving digital landscape with cloud computing, mobility and IoT systems, more sophisticated approaches ...
Panel: Threat Landscape in Flux: Emerging Threats Kevin Kennedy , Nick Delena , Thomas Pace , Mark Ostrowski The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ...
Risk-Based Vulnerability Management: Changing the Narrative for Your Organization Brian Carey Vulnerability Management is a core process to reducing risk for organizations, yet IT and Security ...
Closing Keynote: Identity and Access Management: A Case Study from Harvard Medical School Joe Zurba Good identity management is one of the keys to good cyber hygiene within an organization, ...