SecureWorldStLouis 2020 Sept. 18, 2020 to Sept. 19, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cybersecurity and Industrial Control Systems Craig Reeds This session will cover the special challenges of cybersecurity in Industrial Control Systems (ICS), the ...
Building Resilience in a Smart Nation John Dimaria Smart cities harness digital technology and data to enable organizations to perform better, boost well-being ...
Third-Party Risk: Creating and Managing a Program that Works! David Barton Every organization is concerned with third-party risk. No one wants to be the next Target ...
[OPENING KEYNOTE] Catching Cyber Criminals: Investigative Techniques to Identify Modern Threat Actors and the Clues They Leave Behind During Data Breaches Vinny Troia This keynote will provide insight into modern threat groups like The Dark Overlord, MABNA, and ...
AI and Machine Learning for Information Security Gary Chan Self-learning Artificial Intelligence, also known as Machine Learning (ML), is changing the world. From skillfully ...
Opening the Door to InfoSec Alexis Womble This presentation is about personal experiences over my year as an intern to an associate ...
Zeek and Ye Shall Find: How to Build a Zeek Cluster at Washington University Brian Marentette Washington University has been using Zeek (formerly called BRO) for five years now. We recently ...
[Radware] Cybersecurity Pushed to the Limit Frank Leyva Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the ...
[LUNCH KEYNOTE] Storytelling 4 Cybersecurity Rebecca Harness Today, the industry struggles to articulate the most pressing risks facing a business, leading to ...
Panel: Building a Better Mouse Trap (Emerging Threats) Ron Winward , Daniel Conrad , Matt Modica , Chris Schoen , Chris Sears , Adam Bacia To be successful, as an industry, we must strive to get ahead of the bad ...
Panel: You Got Burned, Now What? (Incident Response) Vinny Troia , Adam Gates , Ronald Pipkins , David Harrier We’ve all heard the adage that it’s not if it happens but when you are ...
Legal Issues in AI, IoT and the Cloud of the Future Dr. Raj Sachdev AI, IoT and the Cloud are no doubt changing the way we live in the ...
Top 10 Activities to Avoid Identity Theft / Financial Fraud John Newcomer In the increasingly online world we live in, many people are concerned about having their ...
CISO Ventures Panel: Are Cybersecurity Startups Meeting Expectations of Buyers Taking a Risk on Them? session level icon Randy Raw , Marc Ashworth , Jeff Kenney N/A
Cybersecurity Careers Alan Berry Everyone has an opinion on what certification is best and what degree is or is ...
Behavioral Defense Using the MITRE ATT&CK Beth Young Indicators of Compromise (IOC) have been a mainstay of security defense, but companies still get ...
Current and Proposed Privacy Regulations and How It Affects Security Marc Ashworth GDPR and CCPA are two of the many privacy standards that are affecting organizations. How ...
[OPENING KEYNOTE] Business Email Compromise: Real World Stories and Practical Defense Christopher Mcmahon The average loss from a bank robbery is about $3,000. The average loss from a ...
Deconstructing Chaos: A Look at the Threat Beyond the Computer Daniel Stiegman Discussions on cyber threats typically don’t go beyond the computer system. Rarely, is the lone ...
7 Ways to Boost InfoSec’s Influence (and Yours) by Communicating Differently Bruce Sussman Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by ...
Opportunity and Risk: How Open APIs Are Transforming Banking Don Peterson Do you know what an Open API is? The data shows the majority of Americans ...
Same Problems but No Servers - Pragmatic Security in a Code-Centric Cloud Tj Gonen Serverless architectures like AWS Lambda are a developer’s playground- no barriers and faster deployments. However, ...
[LUNCH KEYNOTE] How to Manage Your Own Career to Get to the Top Mark Gelhardt Do you have a plan for your future? Why not? You are the leader of ...
Panel: Shifting Landscape of Attack Vectors Brian Louire , Diego Maldonado Leonardo , Teri Green , James Norberg If one thing holds true in cybersecurity it is the fact that our adversaries are ...
Panel: The Battle for the Endpoint Continues (Endpoint Security) Gary Chan , Jon Stitzel , Bob Brown What are you doing to keep the network safe for your employees? You’ve got your ...
Moving from InfoSec Technician to InfoSec Leadership Randy Raw Are you a technician feeling the call towards leadership? Are you just interested in learning ...
Code(break;)ers: Cultivating More Inclusive Pathways to Technology Ronald Williamson The security industry, much like the American workforce as a whole, is facing a crisis: ...
TOO BIG TO FAIL / too small to worry: A Study of Why Security Is a Concern to Every Size of Business Timothy Grace Organizational executives have many concerns, and cybersecurity initiatives are often a low priority until something ...