SecureWorldDenver 2020 Nov. 12, 2020 to Nov. 13, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: The Human Aspect of Security Leadership Yaron Levi Security leadership is largely misunderstood, and many organizations struggle to define their expectations from their ...
The New National Cyber Power Index: Which Nations Are Truly the Most Powerful in Cyber? Julia Voo Think you know which countries are the most powerful in the cyber realm? You may ...
Practical Considerations When Verifying Your Vendors' Cybersecurity Controls Arif Hameed As businesses grow, it becomes increasingly cheaper, more convenient, and more efficient to rely on ...
Panel: Lessons Learned from a Cloud-Based Remote Work Force Marc Ybarra , Christopher , Sherry Callahan The global pandemic forced us all into the cloud; some for the first time, while ...
Pivoting Your Information Security Program to the New Normal Randy Raw We are living in different times that demand different ways of thinking. Many existing Information ...
The Changing Legal Enforcement in Cyber and Privacy Esq. , Jordan Jaworski With the changing legislation, here in the U.S. and globally, there is an increasing emphasis ...
Detect Everything: Bringing Google Scale Threat Detection to Your SOC Svetla Patnaik Skillful threat detection and investigation starts with a diverse hub of security telemetry to draw ...
The New NIST Phish Scale: Revealing Why End-Users Click Dr. Shaneé Dawkins Developed based on over four years of NIST phishing training data, the NIST Phish Scale ...
Panel: Threat Landscape in Flux: Emerging Threats Matt Hubbard , Sam Masiello , Brad Beutlich , Bryan Magoffin The attack surface is shifting, threat actors are adapting, and security teams must also pivot. ...
Ransomware and Digital Extortion: Legal Issues and Practical Responses Daniel Pepper Ransomware incidents increased sharply in 2019 due to organizations’ existing security weaknesses and the development ...
Mid-Day Keynote: Criminal Minds 401: A Glimpse into the Darkness Michael Anaya How do our cyber adversaries think? Easy: like the rest of us. Well, with a ...
Modern Cloud Security Considerations Michael Stephen Transformational projects typically occur when an organization is ready to make significant investments in changing ...
Cyber-Espionage: Out of the Shadows, into the Digital Crosshairs John Grim Cyber-espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, cyber-espionage threat ...
Closing Keynote: Wake Up Inspired: Cultivating Trust and Value for Your Team’s Success Cindi Carter While “first, do no harm” is attributed to the ancient Greek physician Hippocrates, there is ...