<< Back to Sessions Geopolitics and Leadership in the Time of Coronavirus In this session, Admiral Stavridis will lay out the strategic global landscape, addressing both winners and losers as we work through the challenges of the virus — including the...
<< Back to Sessions Incident Response Lessons Learned From the Front Lines At any moment, day or night, your organization can be victimized by devastating cybercrime. You can’t predict when cyberattacks will happen, but you can use proactive incident response to...
<< Back to Sessions Let us have a VERY frank conversation… Information Security is at a painful point in its development. It has failed to deliver on many of its promises. It has held itself up as the savior to businesses and has spectacularly failed to deliver....
<< Back to Sessions Hacker-Powered Data: The Most Common Security Weaknesses and How to Avoid Them As software dependence grows and data volumes swell to new highs, security teams often see a deluge of incoming vulnerabilities from scanners, pen tests, and bug...
<< Back to Sessions Ethical Hackers and the Amygdala Sixty percent of hackers don’t submit vulnerabilities due to the fear of out-of-date legislation, press coverage, and companies misdirected policies. This fear is based on socially constructed beliefs that the...
Recent Comments