SecureWorldDenver 2020 Nov. 12, 2020 to Nov. 13, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote: The Human Aspect of Security Leadership | Yaron Levi | Security leadership is largely misunderstood, and many organizations struggle to define their expectations from their ... | |
The New National Cyber Power Index: Which Nations Are Truly the Most Powerful in Cyber? | Julia Voo | Think you know which countries are the most powerful in the cyber realm? You may ... | |
Practical Considerations When Verifying Your Vendors' Cybersecurity Controls | Arif Hameed | As businesses grow, it becomes increasingly cheaper, more convenient, and more efficient to rely on ... | |
Panel: Lessons Learned from a Cloud-Based Remote Work Force | Marc Ybarra , Christopher , Sherry Callahan | The global pandemic forced us all into the cloud; some for the first time, while ... | |
Pivoting Your Information Security Program to the New Normal | Randy Raw | We are living in different times that demand different ways of thinking. Many existing Information ... | |
The Changing Legal Enforcement in Cyber and Privacy | Esq. , Jordan Jaworski | With the changing legislation, here in the U.S. and globally, there is an increasing emphasis ... | |
Detect Everything: Bringing Google Scale Threat Detection to Your SOC | Svetla Patnaik | Skillful threat detection and investigation starts with a diverse hub of security telemetry to draw ... | |
The New NIST Phish Scale: Revealing Why End-Users Click | Dr. Shaneé Dawkins | Developed based on over four years of NIST phishing training data, the NIST Phish Scale ... | |
Panel: Threat Landscape in Flux: Emerging Threats | Matt Hubbard , Sam Masiello , Brad Beutlich , Bryan Magoffin | The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ... | |
Ransomware and Digital Extortion: Legal Issues and Practical Responses | Daniel Pepper | Ransomware incidents increased sharply in 2019 due to organizations’ existing security weaknesses and the development ... | |
Mid-Day Keynote: Criminal Minds 401: A Glimpse into the Darkness | Michael Anaya | How do our cyber adversaries think? Easy: like the rest of us. Well, with a ... | |
Modern Cloud Security Considerations | Michael Stephen | Transformational projects typically occur when an organization is ready to make significant investments in changing ... | |
Cyber-Espionage: Out of the Shadows, into the Digital Crosshairs | John Grim | Cyber-espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, cyber-espionage threat ... | |
Closing Keynote: Wake Up Inspired: Cultivating Trust and Value for Your Team’s Success | Cindi Carter | While “first, do no harm” is attributed to the ancient Greek physician Hippocrates, there is ... |