SecureWorldAtlanta 2020 Sept. 24, 2020 to Sept. 24, 2020, Portland, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote: We Really Do Need Each Other: Effective Interdepartmental Communication | Tamika Bass | It is now more important than ever for security professionals to communicate effectively with team ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (ZSP) was a new term introduced in 2019 and might just be ... | |
Are You Ready for the Convergence of IIoT, OT, and IT Security? | Dr. John Opala | Business transformation and drive for smart factory initiatives has placed demands on business leaders to ... | |
New Remote Workforce: Privacy and Security Risks and Mitigations | Rebecca Rakoski | The sudden growth in the remote workforce exposed critical cybersecurity and privacy concerns that should ... | |
The DoD’s Cybersecurity Maturity Model Certification (CMMC) Is Coming – Are You Ready? | James Goepel | Supply chain risks are at the top of everyone’s mind today, and the US Department ... | |
Ransomware Incident Command and Lessons Learned for Managers | David Allen | This presentation presents a practical approach to incident command for managers at all levels, irrelevant ... | |
Panel: No Perimeter: Security in the Cloud | Mike Lloyd , Lee Psinakis , Gina Scinta , Ran Rosin , Michael Doyle | Worldwide events have accelerated cloud adoption trends. Organizational reliance on the cloud is at an ... | |
Criminal Minds 401: A Glimpse into the Darkness | Michael Anaya | How do our cyber adversaries think? Easy: like the rest of us. Well, with a ... | |
How Automated Attacks and Bad Bots Can Derail Your Company’s Business | Edward Roberts | You are a security professional. The world is changing; there are transformation initiatives being accelerated ... | |
Panel: Remote Workforce: Lessons Learned | Rj Sudlow , Tom Utley , Christopher Hass | Companies had no real choice as we all moved to the “new normal” and a ... | |
The Booming Business of Malware | Tony Anscombe | Cybercrime continues to flourish despite world circumstances. Ransomware, phishing, and other cyberattacks remain a prevalent ... | |
Security Awareness: Another Brick in the Wall | Alexandra Panaretos | Security awareness and training. The Human Element. Change Management. All of these have resulted in ... | |
Insider Threats: A Multi-Pronged Approach to Protecting Your Organization | Phil Curran | Insider threats are a real danger and cannot be overlooked. While deploying the latest secure ... | |
Moving from Individual Contributor to Cybersecurity Leader | Randy Raw | Are you feeling the call towards cybersecurity leadership? Just being a good technologist is no ... | |
A 'ToR' of the Three Ds: Dark Web, Deep Web, Dark Net | Mike Muscatell | This is a first-hand account into the WILD of the internet. We always hear about ... | |
Panel: Threat Landscape in Flux: Emerging Threats | Allan Liska , Chris Goettl , Dwayne Dreakford | The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ... | |
Public Health Informatics and Pandemic Response | Keyaan Williams | In this presentation, Keyaan Williams will discuss public health informatics and the critical role this ... | |
Closing Keynote: Setting Common Language When Talking to Leadership About IT Risks | Rick Doten | To be successful in presenting IT security to senior leadership, it’s important it is done ... |