Skip to main content
Browse Schedule
Full Schedule
Browse by Date
Saturday, October 26, 2019
Sunday, October 27, 2019
Monday, October 28, 2019
Tuesday, October 29, 2019
Wednesday, October 30, 2019
Browse by Title
Browse by Speakers
Browse by Track
Keyword Search
Student Recommended
Sessions
Conference App
My Schedule
Login required
Evaluations
Login required
Login
Toggle navigation
Home
Browse Schedule
Full Schedule
Browse by Date
Saturday, October 26, 2019
Sunday, October 27, 2019
Monday, October 28, 2019
Tuesday, October 29, 2019
Wednesday, October 30, 2019
Browse by Title
Browse by Speakers
Browse by Track
Keyword Search
Student Recommended
Sessions
Conference App
My Schedule
Login required
Evaluations
Login required
Please Be Advised: Please note that favoriting a session does not mean you have reserved a seat. All sessions are first come, first serve onsite. Pre-Conference Trainings and Workshops require pre-registration.
Browse by Speakers
Browse by Speakers
0
results found.
Type here to filter the list
All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Abasi, Farshad
Forward Security Inc.
Securing Modern API and Microservices-based Applications by Design
Location: Southern 5
Farshad Abasi
Favorite
Aboagye, Lenin
Kogni
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security
Location: Northern E2
Lenin Aboagye
Favorite
Ahn, Gail-Joon
Samsung Research
Security Assurance with Open Source Packages
Location: Southern 5
Gail-Joon Ahn
Favorite
Altman, James
Jackrabbit Learning Experience
Stop and Smell the Learning Roses
Location: Southern 3
James Altman
Favorite
Andrews, Lyron
Profabula
Certified Information Systems Security Professional (CISSP)® with Access to Self-Paced
Location: Northern E4
Lyron Andrews
Favorite
Certified Information Systems Security Professional (CISSP)® with Access to Self-Paced
Location: Northern E4
Lyron Andrews
Favorite
Angelo, Lisa
Angelo Law Firm PLLC
Get Paid or Get Stiffed: Understanding Your Cyber Insurance Policy
Location: Southern 1
Lisa Angelo
Favorite
Anglin, Billy
ARES CYBER DEFENSE LLC
Automating Compliance Evidence for Small Businesses
Location: Southern 1
Billy Anglin
Favorite
Antunes, Adriana
Digital Law Commission, Brazilian Bar Association (DF)
Creating a Human Security Officer
Location: Northern A1-2
Adriana Antunes
Favorite
Armstrong, Robert
Mathan Cyber Security LLC
Purple Teaming—Integrating Offensive and Defensive Cyber Ops
Location: Northern A1-2
Robert Armstrong
Favorite
Ayoub, Rob
FireEye
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
Rob Ayoub
Favorite
B
Baeza, Rocio
CyberSecurityBase
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Rocio Baeza
Favorite
Bailey, John
St. Jude Children’s Research Hospital
A Sensible Approach to Reasonable Security Measures under Data Privacy Regulations
Location: Northern E3
John Bailey
Favorite
Bandler, John
Bandler Law Firm PLLC
Information Security and Law
Location: Asia 4
John Bandler
Favorited
Banerjee, Roney
Castling LLC
Context Based Access Control: A Step Beyond RBAC and ABAC
Location: Asia 5
Roney Banerjee
Favorite
Beam, Bruce
(ISC)2
ISC2’s Digital Transformation – “DETE”
Location: Northern D+DE Corridor
Bruce Beam
Favorited
Beechner, Derin
Black & Veatch
When Technology Isn’t Enough to Keep Families Safe
Location: Northern A1-2
Derin Beechner
Favorite
Benge, Joel
ADG Creative
Let’s Make Risk a Game!
Location: Asia 2
Joel Benge
Favorite
Ben-Meir, Elad
SCADAfence
IT and OT Security—It Takes Two to Secure
Location: Southern 4
Elad Ben-Meir
Favorite
Bergh, Julie
J & S Consulting
Did You Set It and Forget It?
Location: Southern 2
Julie Bergh
Favorite
Bhattacharya, Soumendra
Delta Dental of California
We Due C.A.R.E
Location: Asia 4
Soumendra Bhattacharya
Favorite
Blacketer, Cory
CynergisTek
Defining the Threats: FitBits, Door Locks and Hacking, Oh My!
Location: Northern E4
Cory Blacketer
Favorited
Bodungen, Clint
ThreatGEN
Gaming the System—Anticipating the Incidence of Incidents
Location: Northern BC
Clint Bodungen
Favorite
Brignoni, Alexis
US Department Of Justice
Unsupported Apps: What Can be Done?
Location: Northern E1
Alexis Brignoni
Favorited
Brook, Jon-Michael
Starbucks
Cloud Risk and Governance: Hands-on
Location: Asia 1
Jon-Michael Brook
Favorited
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
Jon-Michael Brook
Favorite
Brooks, Randall
Raytheon
Capture the Flag Employee Retention Through Cyber Training
Location: Northern A1-2
Randall Brooks
Favorite
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
Randall Brooks
Favorite
Brunell, Kyle
EY
Demystifying Connected Device Security Legislation: Practical Advice for Non-lawyers
Location: Northern E4
Kyle Brunell
Favorite
Don’t Let Your Products and Customers be Victims of an Insecure Supply Chain
Location: Southern 5
Kyle Brunell
Favorite
Bulumulle, Gamini
InfoTechnology, Inc.
DevSecOps Automation: Can Security be Fully Automated?
Location: Northern E2
Gamini Bulumulle
Favorite
Burr, Mike
Google
Redefining the Approach to Mobile Security (And Why It Works)
Location: Northern BC
Mike Burr
Favorite
Butts, Derrick
Truth Initiative
Cybersecurity Officers: Preparing for the Dash—R. I. P.
Location: Southern 3
Derrick Butts
Favorite
C
Campbell, William
Predictable Solutions, LLC
CISO: Your First 90 Days
Location: Southern 3
William Campbell
Favorited
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
William Campbell
Favorite
The Myth of the So-Called Talent Gap
Location: Northern A1-2
William Campbell
Favorite
Carmakal, Charles
Mandiant
Preparing for Cyber War: Learnings from Responding to Disruptive Breaches
Location: Northern BC
Charles Carmakal
Favorite
Carnes, John
Anthem, Inc
Account vs. Identity: Who b268eb1a-4838-11e9-8646-d663bd873d93 Really Is
Location: Asia 5
John Carnes
Favorite
How to Build Your Security with Use Cases
Location: Southern 3
John Carnes
Favorite
Shoestring Security: Using a Raspberry Pi for Economic Security
Location: Asia 1
John Carnes
Favorited
The IoT Invasion: It's in Your Homes, It's in Your Companies
Location: Northern E1
John Carnes
Favorite
Carson, Joseph
Thycotic
Real-World Cyberwar and Blockchain Lessons From a Nation State
Location: Northern E4
Joseph Carson
Favorited
Case, Aaron
Geddes Federal Savings & Loan
A Low-Cost Security Monitoring Solution
Location: Northern E4
Aaron Case
Favorite
Castaldo, Chris
Dataminr
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Chris Castaldo
Favorite
Stop and Smell the Learning Roses
Location: Southern 3
Chris Castaldo
Favorite
Caswell, Michelle
Coalfire
A Sensible Approach to Reasonable Security Measures under Data Privacy Regulations
Location: Northern E3
Michelle Caswell
Favorite
Cavalancia, Nick
Techvangelism
Insider Threats: Detecting the (Nearly) Undetectable
Location: Southern 2
Nick Cavalancia
Favorite
Cerin, Biljana
Ostendo Consulting
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
Biljana Cerin
Favorite
Legal, IT or Business—Who is Breaking the Personal Data Protection Rules??
Location: Northern E3
Biljana Cerin
Favorite
Cerullo, Fabio
Certified Cloud Security Professional (CCSP)® Crash Course - [Fabio Cerullo]
Location: Northern E3
Fabio Cerullo
Favorite
Certified Cloud Security Professional (CCSP)® Crash Course - [Fabio Cerullo]
Location: Northern E3
Fabio Cerullo
Favorite
Chickowski, Ericka
Digirupt.io
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Ericka Chickowski
Favorite
Christ, Bryan
Hitachi ID
Adopting An Automation-First Strategy for Identity and Access Management
Location: Northern E2
Bryan Christ
Favorite
Christofferson, Debbie
Cloud Security Alliance
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Debbie Christofferson
Favorite
Collin, Mirtha
(ISC)2
Stop and Smell the Learning Roses
Location: Southern 3
Mirtha Collin
Favorite
Contesti, Diana
DL Consulting
After the Breach: How to Get Through It with Your Sanity and Health
Location: Southern 3
Diana Contesti
Favorite
Cooper, Arthur
NuArx, Inc.
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares
Location: Northern E2
Arthur Cooper
Favorite
Costlow, Jeff
ExtraHop
ST02 - Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
Location: Solutions Theater #221 - Expo Hall
Jeff Costlow
Favorite
Crane, Earl
Emergynt
Let’s Make Risk a Game!
Location: Asia 2
Earl Crane
Favorite
Craven, Patrick
Center for Cyber Safety and Education
Making Cybersecurity Personal
Location: Pacific Hall
Patrick Craven
Favorited
When Technology Isn’t Enough to Keep Families Safe
Location: Northern A1-2
Patrick Craven
Favorite
Currie, Steve
EY
Don’t Let Your Products and Customers be Victims of an Insecure Supply Chain
Location: Southern 5
Steve Currie
Favorite
D
Daemer, Gary
Infusion Points
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Gary Daemer
Favorite
Daghir McCarthy, Dianna
Winget Spadafora & Schwartzberg, LLP
Lightning Round—Everything a CISSP Needs to Know About the Cyber Legal Landscape
Location: Southern 1
Dianna Daghir McCarthy
Favorite
Davis, Tim
Bitglass
ST07 - Who’s Doing What to Whom? Regaining Visibility in a Cloud First World
Location: Solutions Theater #221 - Expo Hall
Tim Davis
Favorite
Deluccia, James
Honeywell
Don’t Let Your Products and Customers be Victims of an Insecure Supply Chain
Location: Southern 5
James Deluccia
Favorite
DeMaster, Aaron
Rexnord Corp.
The 8 Questions a Judge Will Ask You After a Data Breach
Location: Northern E2
Aaron DeMaster
Favorite
Demopoulos, Ted
Demopoulos Associates
Infosec Rock Star: Accelerate Your Career By Building Critical Professional Skills
Location: Southern 3
Ted Demopoulos
Favorite
Demoranville, Kristin
Wipro
Making People and Process the Main Focus of Industrial Cybersecurity Risk Strategy
Location: Southern 4
Kristin Demoranville
Favorite
Diamond, Deidre
CyberSN
Acquiring and Retaining Cybersecurity Talent: A Proven Model
Location: Asia 4
Deidre Diamond
Favorite
Diversity Networking Breakfast
Location: Pacific C
Deidre Diamond
Favorite
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
Deidre Diamond
Favorite
STEAM— Why Not? One Year Later.
Location: Northern A1-2
Deidre Diamond
Favorite
The State of Cybersecurity Careers
Location: Northern A1-2
Deidre Diamond
Favorite
Diernisse, Lloyd
Consultant
Multi-Dimensional Risk Management
Location: Southern 1
Lloyd Diernisse
Favorite
Dunlap, Brandon
Brightfly, Inc.
Account vs. Identity: Who b268eb1a-4838-11e9-8646-d663bd873d93 Really Is
Location: Asia 5
Brandon Dunlap
Favorite
How to Build Your Security with Use Cases
Location: Southern 3
Brandon Dunlap
Favorite
ISC2’s Digital Transformation – “DETE”
Location: Northern D+DE Corridor
Brandon Dunlap
Favorited
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Brandon Dunlap
Favorite
Durkovich, Caitlin
Toffler Associates
Strategic Cyber: Getting the Board On Board
Location: Northern A1-2
Caitlin Durkovich
Favorite
E
Easttom, Chuck
Capitol Technology University
CANCELLED: The Impact of Machine Learning on Cybersecurity
Location: Northern E2
Chuck Easttom
Favorite
Elcock, David
ICMCP
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
David Elcock
Favorite
Emek, Tanner
Hacker
From Villains to Heroes: The Hacker Evolution
Location: Northern E1
Tanner Emek
Favorite
Esparza, John
Schneider-Electric
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
John Esparza
Favorite
Estes, Matt
The Walt Disney Company
Machine Learning : An Attacker's Perspective
Location: Northern BC
Matt Estes
Favorite
Evans, Tomiko
RTAN - Aerial Footprint, LLC
UAVs/Drones are Disrupting the Nation, Consider Innovating Cybersecurity
Location: Asia 5
Tomiko Evans
Favorite
F
Fabritius, Willy
BSI Group America Inc.
Shot Fired From 5,000 Miles
Location: Northern E1
Willy Fabritius
Favorite
Farrell, Elizabeth
Northrop Grumman Corporation
CANCELLED: Cyber Workforce 2.0—Attracting Diverse Student Interest Early (Grades K-12)
Location: Southern 3
Elizabeth Farrell
Favorite
Ferguson, Dave
Qualys
ST10 - Leveraging Swagger/OpenAPI to Design and Build Secure APIs
Location: Solutions Theater #221 - Expo Hall
Dave Ferguson
Favorite
Ferraro, Monique
Hartford Steam Boiler Insurance and Inspection Company
Lightning Round—Everything a CISSP Needs to Know About the Cyber Legal Landscape
Location: Southern 1
Monique Ferraro
Favorite
Freeman, Chrysa
Code42
Building and fostering a Security Awareness Ambassador Program (that gets results!)
Location: Southern 3
Chrysa Freeman
Favorite
Fusco, Pamela
CBG
Listen to What She Has to Say. . .
Location: Southern 1
Pamela Fusco
Favorite
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Pamela Fusco
Favorite
G
Gates, Geoffrey
Lockheed Martin
CANCELLED - Securing Industry 4.0
Location: Southern 4
Geoffrey Gates
Favorite
Gaughf, Charles
(ISC)2
Your Security Awareness Training has Bombed – Now What?
Location: Northern A1-2
Charles Gaughf
Favorite
Giordano, Scott
Spirion
Data Protection: Your New Discipline of Data Privacy + Information Security
Location: Northern E3
Scott Giordano
Favorite
What the California Consumer Privacy Act Means For Your Security Program
Location: Northern E3
Scott Giordano
Favorited
Gorman, Jason
Jackrabbit Learning Experience
Stop and Smell the Learning Roses
Location: Southern 3
Jason Gorman
Favorite
Graham, Thomas
CynergisTek
Defining the Threats: FitBits, Door Locks and Hacking, Oh My!
Location: Northern E4
Thomas Graham
Favorited
Green, Ricardo
Fugue
Using Chaos Engineering to Build Resilient Cloud Security
Location: Northern E2
Ricardo Green
Favorited
Grundemann, Chris
Myriad360
A Reference Model of Cybersecurity Infrastructure
Location: Asia 5
Chris Grundemann
Favorite
Gugle, Anjali
Cisco Systems
AI and Privacy: Intersection of Innovation and Regulation
Location: Northern E3
Anjali Gugle
Favorite
Gulick, Jessica
Katzcy
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Jessica Gulick
Favorite
Gumbs, Gabriel
Spirion
Data Protection: Your New Discipline of Data Privacy + Information Security
Location: Northern E3
Gabriel Gumbs
Favorite
Gupta, Sarbari
Electrosoft Services, Inc.
Me and My Mobile Device: A New Approach for Strong Multidimensional Authentication
Location: Asia 5
Sarbari Gupta
Favorite
Gu, Xinyi
infuzIT, LLC
Honeypots and Machine Learning: An Effective Security Tag Team
Location: Southern 4
Xinyi Gu
Favorited
H
Haines, Darin
MCPc
Are You Thinking About Cybersecurity The Wrong Way?
Location: Northern E4
Darin Haines
Favorite
Hall, Jeff
Auditwerx
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares
Location: Northern E2
Jeff Hall
Favorite
Harris, Shawn
Starbucks Coffee Company
Account vs. Identity: Who b268eb1a-4838-11e9-8646-d663bd873d93 Really Is
Location: Asia 5
Shawn Harris
Favorite
How to Build Your Security with Use Cases
Location: Southern 3
Shawn Harris
Favorite
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
Shawn Harris
Favorite
Hartenstein, Jamal
KAI Partners
Behind the Text: Laws on Data Privacy, Consumer Rights and Cybersecurity, Deconstructed
Location: Northern E2
Jamal Hartenstein
Favorite
Hay, Andrew
Lares
Be an Inspirational Coach, Not an Oppressive Security Executive
Location: Southern 3
Andrew Hay
Favorite
Make Your Organization 10% More Secure
Location: Southern 1
Andrew Hay
Favorite
Haynes, Alex
Cheshire Datasystems
Schrödinger's Vulnerability - Chasing Exploitability, Not Vulnerability
Location: Northern E1
Alex Haynes
Favorited
Hayward, Lucie
Kroll
The Art and Science of Cyber Response
Location: Asia 2
Lucie Hayward
Favorited
Hill, Doug
The Walt Disney Company
Machine Learning : An Attacker's Perspective
Location: Northern BC
Doug Hill
Favorite
Hilton, Dimitrios
LOGIS
Introduction to PCI DSS Credit Card Security/Advance Topics in PCI Compliancy
Location: Oceanic 3
Dimitrios Hilton
Favorite
Hickernell, Christopher
MHI Shared Services Americas
Cybersecurity 101
Location: Northern BC
Christopher Hickernell
Favorite
Hioki, Reynold
State of Hawaii
When Technology Isn’t Enough to Keep Families Safe
Location: Northern A1-2
Reynold Hioki
Favorite
Hoar, Sean
Lewis Brisbois
Lightning Round—Everything a CISSP Needs to Know About the Cyber Legal Landscape
Location: Southern 1
Sean Hoar
Favorite
Hoffman, Holly
Disney Instititute
Luncheon Keynote: Holly Hoffman (Disney Institute)
Location: Pacific Hall
Holly Hoffman
Favorited
Holden, Alex
Hold Security, LLC
Artificial Intelligence: War of the Machines
Location: Northern E2
Alex Holden
Favorite
Honas-Frias, Amanda
Cisco - Duo Security
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
Amanda Honas-Frias
Favorite
Hunt, Steve
Communities of Excellence
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Steve Hunt
Favorite
I
Ihme, Paul
Soteria
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Paul Ihme
Favorite
Ingoldsby, Terrance
Amenaza Technologies Limited
Using Attack Tree Analysis to Make Risk-based Security Decisions
Location: Northern E4
Terrance Ingoldsby
Favorite
J
Jackson, Kevin
Certified Cloud Security Professional (CCSP)® Crash Course - [Kevin Jackson]
Location: Northern E2
Kevin Jackson
Favorite
Certified Cloud Security Professional (CCSP)® Crash Course - [Kevin Jackson]
Location: Northern E2
Kevin Jackson
Favorite
Jaffe, Seth
The Law Office of Seth E. Jaffe
Gaming the System—Anticipating the Incidence of Incidents
Location: Northern BC
Seth Jaffe
Favorite
Get Paid or Get Stiffed: Understanding Your Cyber Insurance Policy
Location: Southern 1
Seth Jaffe
Favorite
Janos, Tara
AbbVie pharmaceutical
Listen to What She Has to Say. . .
Location: Southern 1
Tara Janos
Favorite
Jenkins, Jim
Boeing Employees Credit Union (BECU)
Hack Back—Is It Time?
Location: Asia 4
Jim Jenkins
Favorite
Jensen, Tim
BSI Group America Inc.
Shot Fired From 5,000 Miles
Location: Northern E1
Tim Jensen
Favorite
Jeppson, Travis
Kasten
What You Need to Know About Securing Cloud-Native and Kubernetes
Location: Northern D+DE Corridor
Travis Jeppson
Favorite
Joe, Herbert
Yonovitz & Joe, L.L.P.
Forensic Analyses of Audio, Acoustic and Video Evidence
Location: Asia 5
Herbert Joe
Favorited
From Katz to Carpenter: How SCOTUS Views Evolving Technology and Privacy
Location: Northern E3
Herbert Joe
Favorite
Legal Qualifications of a Testifying Digital Forensic Expert Witness
Location: Northern E1
Herbert Joe
Favorite
Johnson, Kevin
Secure Ideas, LLC
Hands-On OWASP Top 10
Location: Asia 1
Kevin Johnson
Favorite
Hands-On OWASP Top 10
Location: Asia 1
Kevin Johnson
Favorite
Jordan, Matt
JHC Technology Inc.
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Matt Jordan
Favorite
K
Kallumpuram, Rajeevan
Reliance Industries Limited
Security Orchestration with Software-Defined Perimeter and Blockchain
Location: Southern 4
Rajeevan Kallumpuram
Favorite
Karas, Rob
Department of Homeland Security
Breaking and Entering: Emulating the Digital Adversary in 2019
Location: Northern E1
Rob Karas
Favorite
Karnas, Matthew
Sila
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Location: Northern E3
Matthew Karnas
Favorite
Keliiaa, Curtis
Sandia National Laboratories
Protection of Information in Evolving Infrastructure Services
Location: Southern 4
Curtis Keliiaa
Favorite
The Changing Cyber Ecosystem
Curtis Keliiaa
Favorite
Kesterson, Hoyt
Avertium
Those Old Rules for Passwords—Gone
Location: Asia 5
Hoyt Kesterson
Favorite
King, Stuart
Wipro
Making People and Process the Main Focus of Industrial Cybersecurity Risk Strategy
Location: Southern 4
Stuart King
Favorite
Koppen, Jeremy
Mandiant
Preparing for Cyber War: Learnings from Responding to Disruptive Breaches
Location: Northern BC
Jeremy Koppen
Favorite
Kravchenko, Elena
Micro Focus
Three Levels of complexity: Threat Modeling of Containerized Applications
Location: Southern 5
Elena Kravchenko
Favorite
Krishnan, Ashwin
UberKnowledge
CANCELLED: Building trust in an age of AI and data science #TheMoralCompass
Location: Northern E3
Ashwin Krishnan
Favorite
Kurzynski, Terry
The DoCRA Council
The 8 Questions a Judge Will Ask You After a Data Breach
Location: Northern E2
Terry Kurzynski
Favorite
L
Lakhani, Aamir
Fortinet
Killing them Softly with My Song—Gathering Intelligence with Enterprise Honeypots
Location: Northern E4
Aamir Lakhani
Favorited
Lee, Sarah
Mississippi State University
STEAM— Why Not? One Year Later.
Location: Northern A1-2
Sarah Lee
Favorite
Leifheit, Glenn
Microsoft Corp.
After the Breach: How to Get Through It with Your Sanity and Health
Location: Southern 3
Glenn Leifheit
Favorite
I Need a Mentor. Now What?
Location: Asia 5
Glenn Leifheit
Favorite
When My Life Went to Hell—What I Learned about Risk
Location: Northern A1-2
Glenn Leifheit
Favorite
LeLand, Michael
McAfee
The Automation Quandary
Location: Northern BC
Michael LeLand
Favorite
Lesteven, Didier
WALLIX
Adapt your cybersecurity and manufacturing approach to the explosive growth of Industrial IoT!
Location: Northern E4
Didier Lesteven
Favorite
Liderman, Eugene
Google
Redefining the Approach to Mobile Security (And Why It Works)
Location: Northern BC
Eugene Liderman
Favorite
Linde, Matt
IOR Analytics
ST08 - Engine Building: A hospitality company builds a governance “engine” to improve data privacy.
Location: Solutions Theater #221 - Expo Hall
Matt Linde
Favorite
Lipner, Steven
SAFECode
Getting Started With SDL
Location: Northern BC
Steven Lipner
Favorite
Little Limbago, Andrea
Virtru
Global Factors Driving Data Privacy Regulation
Location: Southern 1
Andrea Little Limbago
Favorite
Lomax, Chad
Delta Dental of California
We Due C.A.R.E
Location: Asia 4
Chad Lomax
Favorite
M
Mackay, James
Markel Corporation
GDPR: A Year on the Data Protection Rollercoaster
Location: Northern E3
James Mackay
Favorite
Madan, Reena
Verizon
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Reena Madan
Favorite
Mahler, Loren
Dealy Mahler Strategies, LLC
CANCELLED: Preserving Trust Through Integrated Incident Response Planning
Location: Asia 4
Loren Mahler
Favorite
Malik, Javvad
KnowBe4
(JM)
2
and the Evangelist Framework
Location: Southern 3
Javvad Malik
Favorite
We Take Security Seriously
Location: Northern BC
Javvad Malik
Favorite
Malisow, Ben
Certified Cloud Security Professional (CCSP)® Crash Course - [Ben Malisow]
Location: Northern E1
Ben Malisow
Favorite
Certified Cloud Security Professional (CCSP)® Crash Course - [Ben Malisow]
Location: Northern E1
Ben Malisow
Favorite
Marien, John
The MITRE Corporation
In God We Trust. Everybody Else Bring Data - Secure Software Development's "Vital few" Metrics
Location: Southern 5
John Marien
Favorited
McConnell, Barry
Goldman Sachs & Co.
Avoid Your Next Breach by Effectively Managing Privileged Access
Location: Asia 5
Barry McConnell
Favorite
Critical Elements of Application and Data Security in an AWS Cloud
Location: Northern D+DE Corridor
Barry McConnell
Favorited
McGann, Chuck
The McGann Group, LLC.
After the Breach: How to Get Through It with Your Sanity and Health
Location: Southern 3
Chuck McGann
Favorite
McNamee, Kevin
Nokia
IoT Gone Wild: The Coming of Age of IoT Botnets.
Location: Northern E1
Kevin McNamee
Favorited
McQuiggan, James
KnowBe4
Cybersecurity 101
Location: Northern BC
James McQuiggan
Favorite
(JM)
2
and the Evangelist Framework
Location: Southern 3
James McQuiggan
Favorite
Now What? How to Start and Operate Your (ISC)
2
Chapter
Location: Asia 4
James McQuiggan
Favorite
McRee, Russ
Microsoft
DFIR Redefined: Deeper Functionality for Investigators with R
Location: Southern 4
Russ McRee
Favorite
Meeker, Tina
Beacon Information Security LLC
Building and fostering a Security Awareness Ambassador Program (that gets results!)
Location: Southern 3
Tina Meeker
Favorite
Mehanlingam, Jegannathan
CipherWorks
Semantic Encryption: A New Form of Encryption to Assist in Complying with GDPR and CCPA
Location: Asia 4
Jegannathan Mehanlingam
Favorite
Melnick, David
Proofpoint Inc.
Sun Tzu and the Art of Understanding and Responding to Your Attacker
Location: Southern 2
David Melnick
Favorite
Meyer, Ean
Marriott Vacations Worldwide
Cybersecurity 101
Location: Northern BC
Ean Meyer
Favorite
Miedaner, Tony
Geddes Federal
A Low-Cost Security Monitoring Solution
Location: Northern E4
Tony Miedaner
Favorite
Mills-Afford, Sandy
AliveTek Inc.
Your Security Awareness Training has Bombed – Now What?
Location: Northern A1-2
Sandy Mills-Afford
Favorite
Minella, Jennifer
Carolina Advanced Digital, Inc.
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Jennifer Minella
Favorite
Moolrajani, Pankaj
Delta Dental of California
We Due C.A.R.E
Location: Asia 4
Pankaj Moolrajani
Favorite
Moore, Russell
Computex Technology Solutions
From Ethical Hacking to Ethical Attacking
Location: Southern 2
Russell Moore
Favorited
Mude, Manju
Verizon Media
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Manju Mude
Favorite
Mukkamala, Srinivas
RiskSense
CANCELLED: IoT: Understanding and Addressing the Unknown Threat
Location: Northern E1
Srinivas Mukkamala
Favorited
Mundhenk, David
Herjavek Group
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares
Location: Northern E2
David Mundhenk
Favorite
Murphey, Chris
Galvanize
ST03 - CISOs in the Boardroom: Confidently Presenting Cyber Risk Storyboards
Location: Solutions Theater #221 - Expo Hall
Chris Murphey
Favorite
Murphy, Buzz
Training Camp
ST05 - Inside the Dark Web: A Guide for Security and Business Professionals
Location: Solutions Theater #221 - Expo Hall
Buzz Murphy
Favorited
Murray, William
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
William Murray
Favorite
N
Neal, Andrew
Gartner
Transformational Governance: Guiding Your Way to a Secure Digital Transformation
Location: Southern 1
Andrew Neal
Favorite
Nealon, Richard
(ISC)2 Ethics Committee
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
Richard Nealon
Favorite
Neithercutt, Jeff
Blockchain Of Evidence
Blockchain of Evidence
Location: Southern 4
Jeff Neithercutt
Favorite
Nicholson, Sean
Qualys
A 360˚ Approach to Securing the Cloud - Total Visibility and Comprehensive Security for Cloud workloads and infrastructure
Location: Southern 1
Sean Nicholson
Favorite
Nipper, Johnny
From Villains to Heroes: The Hacker Evolution
Location: Northern E1
Johnny Nipper
Favorite
Njoroge, Noureen
CISCO
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Noureen Njoroge
Favorite
Nusz, Harvey
Capgemini
Creating a Privacy Framework
Location: Northern E3
Harvey Nusz
Favorite
CANCELLED - iRPA, or Intelligent Robotics Process Automation—Tips, Tricks and Pitfalls to Avoid
Location: Southern 4
Harvey Nusz
Favorite
Semantic Encryption: A New Form of Encryption to Assist in Complying with GDPR and CCPA
Location: Asia 4
Harvey Nusz
Favorite
O
O'Connor, Paul
Verizon
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Paul O'Connor
Favorite
Olsen, Xena
Financial Services
Cyber Threat Intelligence After Dark
Location: Southern 2
Xena Olsen
Favorited
O'Neil, John
Edgewise Networks
Five-Sigma Network Events (and How to Find Them)
Location: Southern 2
John O'Neil
Favorited
Orleans, John
Mesirow Financial
DLP Sucks and Why You Should Use It
Location: Northern E2
John Orleans
Favorited
Otten, Robert
DLA Piper
Operationalizing Privacy Regulation in Connected Ecosystems
Location: Northern E3
Robert Otten
Favorite
P
Painter Randall, Karen
Connell Foley, LLP
Lightning Round—Everything a CISSP Needs to Know About the Cyber Legal Landscape
Location: Southern 1
Karen Painter Randall
Favorite
Pal, Gaurav
stackArmor
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Gaurav Pal
Favorite
Perminter, Aric
Lynx Technology Partners, Inc.
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
Aric Perminter
Favorite
Patentreger, Kathleen
Center for Internet Security (CIS)
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Kathleen Patentreger
Favorite
Pearlson, Keri
MIT Sloan School of Management
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Keri Pearlson
Favorite
Phillips, Susan
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Susan Phillips
Favorite
Phiri, Katrina
PwC
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Katrina Phiri
Favorite
Plato, Andrew
Anitian
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Andrew Plato
Favorite
Platt, Charles
Bitscope Consulting
Strategic Cyber: Getting the Board On Board
Location: Northern A1-2
Charles Platt
Favorite
Plouffe, James
MobileIron
Embracing Zero Trust (When You Aren't the World's Largest Internet Company)
Location: Northern D+DE Corridor
James Plouffe
Favorite
Poore, Ralph
PCI Security Standards Council
Those Old Rules for Passwords—Gone
Location: Asia 5
Ralph Poore
Favorite
Porat, Aelon
Cision
Infiltrating an Organization: A Live Demo
Location: Southern 2
Aelon Porat
Favorited
Q
Quinn, Michael
Kroll
The Art and Science of Cyber Response
Location: Asia 2
Michael Quinn
Favorited
Qu, Lynette
Delta Dental of California
We Due C.A.R.E
Location: Asia 4
Lynette Qu
Favorite
R
Raggo, Michael
802 Secure, Inc.
Cyber Physical Security: Addressing IoT Risks
Location: Northern E4
Michael Raggo
Favorite
Ramineni, Avinash
Kogni
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security
Location: Northern E2
Avinash Ramineni
Favorite
Ramzan, Zulfikar
RSA Security
The Future of Digital Identity in the Era of Digital Transformation
Location: Northern BC
Zulfikar Ramzan
Favorite
Rasmussen, Gideon
Virtual CSO, LLC
Follow the Risk with Adaptive Cybersecurity Assessments
Location: Southern 2
Gideon Rasmussen
Favorited
Raygoza, Favian
Bright Health
Security.txt: Responsible Disclosure for the Next Generation
Location: Southern 4
Favian Raygoza
Favorite
Read, David
infuzIT, LLC
Honeypots and Machine Learning: An Effective Security Tag Team
Location: Southern 4
David Read
Favorited
Reeves, Duane
NCCGroup
CANCELLED: Telephony: The Forgotten Network Threat
Location: Northern E1
Duane Reeves
Favorite
Insider Threat: A Review of Electronic Surveillance Threats and the Countermeasures
Location: Northern E1
Duane Reeves
Favorited
Regensberg, Mark
Utility Warehouse
CANCELLED - macOS in the Enterprise: Threats, Risks and Management
Location: Northern E4
Mark Regensberg
Favorite
Remes, Wim
NRJ Security
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
Wim Remes
Favorite
Remes, Wim
Wire Security bvba
Product Security Shouldn't be Painful
Location: Southern 5
Wim Remes
Favorite
Reubendale, Myron
Collaborative Solutions, Inc.
Context Based Access Control: A Step Beyond RBAC and ABAC
Location: Asia 5
Myron Reubendale
Favorite
Rice, Alex
HackerOne
From Villains to Heroes: The Hacker Evolution
Location: Northern E1
Alex Rice
Favorite
Rides, Kristopher
Tiro Security
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
Kristopher Rides
Favorite
Rogge, MIke
AKAMAI Technologies
Taming the Bots
Location: Asia 4
MIke Rogge
Favorite
Rothke, Ben
Tapad
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares
Location: Northern E2
Ben Rothke
Favorite
Rudd, Gordon
Venminder
Creating Scalable, Sustainable Cybersecurity for Any-Sized Corporation
Location: Northern A1-2
Gordon Rudd
Favorite
Failure is Not an Option – Achieving Lasting Success as CISO
Location: Southern 5
Gordon Rudd
Favorite
Failure is Not an Option – Achieving Lasting Success as CISO
Location: Southern 5
Gordon Rudd
Favorite
Rudloff, Robert
RubinBrown
Fraud—The Nexus of Insiders, Outsiders and Cyber
Location: Northern E1
Robert Rudloff
Favorite
Ryba, Robert
Wyndham Destinations
Yes, The Auditors Have Arrived! Assessment and Assurance of Cybersecurity Controls
Location: Southern 1
Robert Ryba
Favorite
Rynarzewski, Alan
Purdue Global
ST09 - Gamification of cybersecurity and associated certifications
Location: Solutions Theater #221 - Expo Hall
Alan Rynarzewski
Favorite
S
Sandage, Tim
Amazon Web Services
AWS Authority to Operate (ATO) - Compliance as Code
Location: Northern D+DE Corridor
Tim Sandage
Favorite
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Tim Sandage
Favorite
Sanford, Adriana
CNN Español Analyst/ Contributor
What You Need to Know About Global Privacy Laws, Cyber Cases and the Changing Landscape
Location: Northern BC
Adriana Sanford
Favorite
Saxon, Caroline
CoreCivic
The Case for DevSecOps—And Recognizing the 'Mine, Mine, Mine' Paradigm
Location: Southern 5
Caroline Saxon
Favorite
SCANLON, THOMAS
Carnegie Mellon University
From The Start: Infuse Security Into Requirements Architecture and Design
Location: Southern 5
THOMAS SCANLON
Favorite
Desai, Avani
Schellam & Company
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Avani Desai
Favorite
Schurman, Christopher
Atos
When Technology Isn’t Enough to Keep Families Safe
Location: Northern A1-2
Christopher Schurman
Favorite
Schwartau, Winn
The Security Awareness Company
Ethical Bias in AI-Based Security Systems: The Big Data Disconnect
Location: Northern E2
Winn Schwartau
Favorited
The History of the Future of Cybersecurity Education
Location: Northern BC
Winn Schwartau
Favorited
Sci, Michael
eSentire
The Art of Cyber Threat Hunting - Behind the Scenes of MDR
Location: Southern 2
Michael Sci
Favorite
Seshagiri, Girish
Ishpi Information Technologies, Inc.
In God We Trust. Everybody Else Bring Data - Secure Software Development's "Vital few" Metrics
Location: Southern 5
Girish Seshagiri
Favorited
Shahidzadeh, Shahrokh
Acceptto Corporation
ST04 - Protecting Your Most Important Resources from Breach with Continuous Behavioral Authentication
Location: Solutions Theater #221 - Expo Hall
Shahrokh Shahidzadeh
Favorite
Shaikh, Tariq
CVS Health
The No. 1 Cybersecurity Project For Every Enterprise and CISO: Privileged Access Management
Location: Asia 5
Tariq Shaikh
Favorite
Sharma, Deepak
Goldman Sachs & Co.
Avoid Your Next Breach by Effectively Managing Privileged Access
Location: Asia 5
Deepak Sharma
Favorite
Critical Elements of Application and Data Security in an AWS Cloud
Location: Northern D+DE Corridor
Deepak Sharma
Favorited
Sheldrake, James
Egress Software Technologies
Defending Impossible Risk Vectors: Human Frailty, Curiosity, and People-centric Risks
Location: Northern E3
James Sheldrake
Favorite
Silk, Sandy
Harvard University
From Surviving to Thriving as a Woman in Cybersecurity
Location: Southern 3
Sandy Silk
Favorite
Sills, Tim
AWS SAS, LLC.
Serverless Computing: Top Security Challenges and How to Mitigate Them
Location: Northern D+DE Corridor
Tim Sills
Favorite
Simpson, Curtis
Armis
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
Location: Northern E4
Curtis Simpson
Favorite
ST06 - Ain’t Misbehavin’? Real World Stories of Mischievous Connected Devices
Location: Solutions Theater #221 - Expo Hall
Curtis Simpson
Favorite
Simpson, Wesley
(ISC)2
ISC2’s Digital Transformation – “DETE”
Location: Northern D+DE Corridor
Wesley Simpson
Favorited
Sisler, John
AICPA
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
John Sisler
Favorite
Smallwood, Andrew
Booz Allen Hamilton
Implementing Common Open Standards Across Cybersecurity Learning and Cyber Ranges
Location: Northern E4
Andrew Smallwood
Favorite
Smee, Heather
Westfield
Creating a Compliance Roadmap: One Company's Journey
Location: Southern 1
Heather Smee
Favorite
Smith, Sharon
Verizon
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
Sharon Smith
Favorite
Snow, Selvan
Snow Group Technologies
Mechanized Security Architecture: Using ESA to Drive Strategy
Location: Southern 1
Selvan Snow
Favorite
Shoestring Security: Using a Raspberry Pi for Economic Security
Location: Asia 1
Selvan Snow
Favorited
The IoT Invasion: It's in Your Homes, It's in Your Companies
Location: Northern E1
Selvan Snow
Favorite
Sosa, Jennifer
TLS
'And the Sky is Grey': Guidance to Prevent California's Privacy Laws from Becoming a Nightmare
Location: Northern E3
Jennifer Sosa
Favorite
Transformational Governance: Guiding Your Way to a Secure Digital Transformation
Location: Southern 1
Jennifer Sosa
Favorite
Speake, Graham
Accenture
CANCELLED: Developing Secure IoT Devices for Today and Tomorrow
Location: Southern 4
Graham Speake
Favorite
Speelman, Walter
(ISC)2 Central Florida Chapter
Cybersecurity 101
Location: Northern BC
Walter Speelman
Favorite
Stahl, Florian
AVL Software & Functions
Secure Software Engineering for Cars: Practical Insights and Success Factors
Location: Southern 5
Florian Stahl
Favorite
Steffens, Jennifer
IOActive
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Jennifer Steffens
Favorite
Steinke, Gerhard
Seattle Pacific University
Hack Back—Is It Time?
Location: Asia 4
Gerhard Steinke
Favorite
Stella, Josh
Fugue
Using Chaos Engineering to Build Resilient Cloud Security
Location: Northern E2
Josh Stella
Favorited
Stoffell, Kevin
Battelle Memorial Institute
Security Architecture Development
Location: Southern 4
Kevin Stoffell
Favorite
Security Architecture Development
Location: Southern 4
Kevin Stoffell
Favorite
Stone, Jen
Security Metrics
ST01 - JavaScript Skimming: How it Works and Why Current Solutions are Ineffective
Location: Solutions Theater #221 - Expo Hall
Jen Stone
Favorite
Strayer, Ethan
Information Technology
Yes, The Auditors Have Arrived! Assessment and Assurance of Cybersecurity Controls
Location: Southern 1
Ethan Strayer
Favorite
Sweet, Jeffrey
American Electric Power
Securing the Supplier: Supply Chain Complexity Creates Security Vulnerability
Location: Southern 2
Jeffrey Sweet
Favorite
T
Taylor, Glen
The Walt Disney Co.
Machine Learning : An Attacker's Perspective
Location: Northern BC
Glen Taylor
Favorite
Tesch, Liz
Microsoft
Trends in Cloud Security: Where We're Going, We Don't Need Roads
Location: Northern BC
Liz Tesch
Favorite
Thomas, Derrick
Amgen
Cybersecurity 101
Location: Northern BC
Derrick Thomas
Favorite
Thompson, Robert
Department of Homeland Security
Breaking and Entering: Emulating the Digital Adversary in 2019
Location: Northern E1
Robert Thompson
Favorite
Thornton, Del
Ernst & Young LLP
Demystifying Connected Device Security Legislation: Practical Advice for Non-lawyers
Location: Northern E4
Del Thornton
Favorite
Tipper-Luster, Tanya
Wyndham Destinations
Yes, The Auditors Have Arrived! Assessment and Assurance of Cybersecurity Controls
Location: Southern 1
Tanya Tipper-Luster
Favorite
Treadwell, Shayla
ECS Federal
Fortnite and Behaviorism: Building Effective Security Awareness Strategies
Location: Northern A1-2
Shayla Treadwell
Favorite
Tychansky, Richard
NA
Containers in the Cloud: Applied Threat Modeling
Location: Northern D+DE Corridor
Richard Tychansky
Favorite
Controlling 5G Networks: Enter the World of Cyber World War
Location: Southern 4
Richard Tychansky
Favorite
Dark Web Threats: From Technical Proof-of-Concepts to Tactical Weapons
Location: Southern 4
Richard Tychansky
Favorited
Hybrid Clouds: Security is Not What it SIEMs
Location: Northern D+DE Corridor
Richard Tychansky
Favorite
V
Valani, Altaz
Security Compass
Building Secure Software Takes a Champion
Location: Southern 5
Altaz Valani
Favorite
Vaughan, Lisa
Mississippi Department of Environmental Quality
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Lisa Vaughan
Favorite
Veltsos, Chris
MSUM
5 Ways to Improve Your Cyber Risk Communications
Location: Asia 4
Chris Veltsos
Favorite
Von Geldern, Erik
FXCM
Account vs. Identity: Who b268eb1a-4838-11e9-8646-d663bd873d93 Really Is
Location: Asia 5
Erik Von Geldern
Favorite
How to Build Your Security with Use Cases
Location: Southern 3
Erik Von Geldern
Favorite
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
Erik Von Geldern
Favorite
The IoT Invasion: It's in Your Homes, It's in Your Companies
Location: Northern E1
Erik Von Geldern
Favorite
W
Waddell, Dan
Zeneth Technology Partners
STOP! Don't Post That Job Description Yet (Or, How to Build Your Security Team the Right Way)
Location: Northern A1-2
Dan Waddell
Favorite
Wagner, Douglas
IBM
Addressing the Benefits and Challenges of Implementing the MITRE ATT&CK Framework
Location: Southern 2
Douglas Wagner
Favorite
Waits, Julian
Devo, Inc.
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
Julian Waits
Favorite
Walker, David
AgileThought, Inc
Secure Application Lifestyle
Location: Southern 5
David Walker
Favorite
Wan, Anna
University of Southern Mississippi
STEAM— Why Not? One Year Later.
Location: Northern A1-2
Anna Wan
Favorite
Waters, Dave
BMC Software
DIY Data Lake: Enabling Your Team to Find the Needle in a Very Large Haystack
Location: Northern E4
Dave Waters
Favorite
Waugh, Ben
Redox Inc
Building a Modern, Automated and Scalable Identity and Access Management Platform
Location: Asia 5
Ben Waugh
Favorite
Weber, Mike
Coalfire
Hacking the Cloud: Learning the Nuances of Cloud Penetration Testing
Location: Northern D+DE Corridor
Mike Weber
Favorite
Weisberg, Michael
Garnet River. LLC
Managing Security in the Small Client MS[S]P Environment
Location: Northern E2
Michael Weisberg
Favorite
The Contract CISO: Bringing Security in Line with Business
Location: Asia 4
Michael Weisberg
Favorite
'You’ve Got to be Kidding!': WTF Moments in Information Security
Location: Asia 4
Michael Weisberg
Favorite
Wells, Matthew
Shujinko
Compliance by Design: How to Build in the Public Cloud
Location: Northern D+DE Corridor
Matthew Wells
Favorite
Whelchel, Andrew
Okta
Don't Become the Next Headline: API Security for Security Executives
Location: Northern D+DE Corridor
Andrew Whelchel
Favorited
Secure Those Droids You Are Looking for Faster than You Can Read This
Location: Northern E1
Andrew Whelchel
Favorite
Whiteside, Larry
ICMCP
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
Larry Whiteside
Favorite
Williams, Crystal
Women's Society of Cyberjutsu
STEAM— Why Not? One Year Later.
Location: Northern A1-2
Crystal Williams
Favorite
Williams, Jacob
Rendition Infosec
Threat Hunting for M&A Cyber Due Diligence
Location: Southern 2
Jacob Williams
Favorite
Winkler, ira
Skyline Technology Solutions
Creating a Human Security Officer
Location: Northern A1-2
ira Winkler
Favorite
Woerner, Ronald
Bellevue University
Cybersecurity Tips, Tools and Techniques for Every CISSP—Updated for 2019
Location: Northern BC
Ronald Woerner
Favorited
Womersley, Beth
RubinBrown
Fraud—The Nexus of Insiders, Outsiders and Cyber
Location: Northern E1
Beth Womersley
Favorite
Worstell, Karen
W Risk Group
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Karen Worstell
Favorite
Y
Yaworski, Peter
Shopify
From Villains to Heroes: The Hacker Evolution
Location: Northern E1
Peter Yaworski
Favorite
Yeoh, John
Cloud Security Alliance
Cloud Autonomy: Advancing Levels of Security
Location: Northern D+DE Corridor
John Yeoh
Favorite
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
John Yeoh
Favorite
Z
Zahedi, Nate
Microsoft
Importance of Cyber Security Incident Response Exercise for operational readiness
Location: Southern 2
Nate Zahedi
Favorite
Back to Top