CyberCraftSecurity 2020 Oct. 1, 2020 to Oct. 2, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Fraud in a Time of COVID Cynthia Hetherington Predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions.
Networking: Breaking into Cybersecurity Trissa Sarmienton , Dr Greenwood Pop in whether you come with or seek advice breaking into cybersecurity
Security Awareness and Why it Matters Isaac Painter Addressing technology security risk is the go-to but there’s a change in tide and addressing ...
Power Boosts for Your Resume and How to Rock Any Cybersecurity Interview Lindsey Buckwalter Do you struggle to get noticed by recruiters? Are you constantly applying for jobs, to ...
Tossing it over the wall: generating action when they don’t know to care Steve Landes Cyber/fraud professionals often struggle creating business understanding, with the laypeople caring enough to do something ...
Part 1: Lessons from an $8.5MM USD Fraud (Ethics CPE) Nathan Mueller Reformed fraudster speaks on controls, ethics and reality of the fraud triangle.
Breach trends, financial impact and how to protect your business Dean Sapp Consumers, corporations, not for profit organizations, small-medium biz are all being targeted in unprecedented ways ...
Physical Pen Testing: I am not a criminal Andrew Hunter Tips, tricks and tools to learn in physical pentesting before criminals break into your organization
Phishing Deep Waters Kody Cowley Recent advesary examples and the methods used to get past even advanced anti-phishing tools and ...
Part 2: Lessons from an $8.5MM USD Fraud (Ethics CPE) Nathan Mueller Reformed fraudster speaks on controls, ethics and reality of the fraud triangle.
Explore ECS N/a N/A
Keynote: The New Reality: Bringing Order to Chaos with Unified Endpoint Security John Mcclurg We’re poised to deliver a new reality across devices, networks, apps, and people leveraging AI, ...
Financial Identity Takeover Thomas O'malley No single person is immune to identity takeover. Learn actionable steps to protect yourself from ...
Is the Dark Web Really Dark?? Chelsea Pierre This presentation will answer the myths, rumors, misconceptions, and truths of the Dark Web
Ethics - Honest people steal Dana Paxton Think honest people don't steal? Think again.
Educating the Next Generation of Cybersecurity Professionals Jimmie Lenz Building a Cybersecurity graduate program in an engineering school, that goes beyond the technical to ...
Cybersecurity: What's LAW got to do with it? Thomas Isom Discover the foundations of privacy law, consider the interplay between cyber ethics and law, and ...
Social Engineering: The Art of War Simon Hunter Attackers know that the human factor is the biggest vulnerability for any organization, and they ...
Fraud Risk Management-Prevention is Key Melissa Goddard Fraud detection is ideal but prevention is a must. We'll walk through key preventative measures ...
Breaking into Cybersecurity as a Silent Partner Benjamin Nicklaus , Daniel Coley , Allyn Roberts , Ben Jenkins , Dr Finn Come explore how becoming a software developer can launch you into a career in cybersecurity.
“Of Cabbages & Kings”: The New Security & How AI is Liberating Us Matt Mcclurg Reactive Detection & Perimeter Trust. We’ll review one CISO’s journey, the forces that presaged this ...
Panel: Securing Your Home in this New Virtual Reality David Soldani , Sally Illingworth , Shamane Vogel What does cyber warfare mean to you? For most of us it doesn't mean much. ...
Keynote: Unmasking Madoff - An Insider Speaks Matt Casey Hear first hand from the man that brought down Bernard Madoff, ponzi scams and landmark ...
Investigators-toolbox.com website review- with FREE membership giveaway Matthew Spaier Learn about this exclusive resource community for investigative professions that combines networking, learning and data ...
The Anti-Fraud Playbook: Moving from Theory into Practice Sophia Minder Learn how to bridge the gap between cyber and fraud with a focus on translating ...
Understanding the Difference Between Security and Compliance Scott Russell Addressing the main differences between security and compliance and why you can't have one with ...
Criminal Minds 401: A Glimpse into Darkness Kyle Anaya Cyber threats are external and internal. Attendees will be able to identify and guard their ...
Digital stewardship: Dynamics of How people protect money Ebenezer Allen Cybersecurity is a people problem, not a tech problem. We need to focus on the ...
Forensics & OSINT Deep Dive Craig Pedersen Gain a deeper insight into how open source intelligence is collected and used in a ...
Rogue Executives: The Almost Perfect Collaboration! Geetha A Rubasundram The challenge of investigating when rogue executives collaborate.
The Art of Investigation Chelsea Sackman Discuss the mental traits, such as adaptability, curiosity, ingenuity and skepticism that investigators can hone ...
Keynote: International Fraud and the Defense Against The Dark Arts Nick Espinosa Join World Famous Security Fanatic as he takes us through fighting international frauds.
The Investigation Game | Case of the Cash Flow Fiasco Leah Wietholter This session provides an opportunity to explore the fraud risks that exist when businesses are ...
Breach Clarity is ROI From Connecting Compromised Data With Fraud Prevention Jim Van Dyke An entirely new approach using AI, algorithms, databases on breached data, and a consumer CX ...
Fraud psychology: How scammers exploit our vulnerabilities Martina Dove Fraud is becoming more sophisticated, yet very little attention is paid to individual vulnerability to ...
Whistleblower University: Intro to Whistleblowing 101 Heidi Weber An overview of the process a whistleblower goes through that will surprise anyone other than ...
File and Java based Ransomware Dennis Underwood Technical discussion on file/java based ransomware actionable intelligence
The Essentials of Interviewing for Fraud and Cyber Crime Inquiries Mark Anderson How to manage and succeed in this COVID-19 age and comprehensive insights into the mechanics ...
To Catch a Thief... How to prevent fraud in your business Natalie Shaw Red flags of a "trusted employee" who turned out to be a thief, and perhaps ...
Cyber Challenges in Connected & Autonomous Vehicles (CAVs) Aj Khan Understanding the Cyber risk to the VEHICLE OF THE FUTURE
Fireside chat: Financial Identity Matt O'malley N/A