2019
Keith Gordon
Abstract: In this panel discussion, SOC leaders offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your organization for the next major security incident, even if your enterprise doesn’t have a SOC in place. Keith Gordon is the Chief Information Security Officer […]
Christopher Hadnagy
Abstract: In this eye-opening presentation, Chris will talk about social engineering through a scientific lens. He will provide an interesting and often overlooked glimpse into the “why” behind the “what”. Chris will discuss amygdala hijacking, emotional triggers, and he’ll even play a live vishing call to analyze with you and walk you through how it […]
Terry Halvorsen
Abstract: Coming Soon. Terry Halvorsen started with Samsung electronics on April first of this 2017 as an Executive Vice President in the Business to Government group. He has since been appointed as the Chief Information Officer and Executive Vice President IT and Mobile Business to Business group Samsung Electronics. Prior to Joining Samsung Electronics, Mr. […]
Jon Hightower
Abstract: Small Businesses face similar cybersecurity risk as large corporations and yet they have much less resources to devote to preventing data breaches. UNC Charlotte’s Annual Cybersecurity Symposium is launching a new education program aimed at helping small businesses in the Charlotte area. In this half-day workshop, we have assembled a panel of experts with […]
Alex Hutton
Alex Hutton is the technology executive over the Application Defense and Cybersecurity Analytics teams in Bank of America’s Cybersecurity Defense function. Prior to this position, his responsibilities included Emerging Threat Analytics and Disruption, Cyber Threat Intelligence, and Security Data Services/Data Science. Formerly, Hutton was a Security Leader and Director of Operational Risk at Zions Bancorporation. […]
Todd Inskeep
Abstract: What will security look like in the next 20 years? What technologies will need security, and what will security work look like? In this session, Todd Inskeep will provide a thought-provoking perspective on the future of security as today’s buzzword technologies escape the “Trough of Disillusionment” and become part of the fabric of enterprise […]
Kenneth Jackson
Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be encrypted before storing it in the cloud or where your application needs to manage the encryption and decryption of that data. The AWS Encryption SDK is a […]
Bill Joll
Abstract: Review some of the cybersecurity priorities required for Smart Cities Innovations, including: • Establishing assured identity to improve our posture in zero trust environments • Enhanced monitoring, analytics, and adaptive cyber response • Movement to software-defined environments for software defined perimeters (SDP), software defined networks (SDN) and endpoints • Securing access to commercial cloud […]
Mark Miller
Abstract: The move to incorporate security into the DevOps pipeline has gotten world wide attention. DevSecOps has become an essential consideration for DevOps transformation initiatives. In this session, Mark Miller, Core Organizer of DevSecOps Days and Executive Producer of the DevSecOps Podcast Series, will talk about the culture of DevSecOps, the most current advances in […]
Allison Miller
Abstract: If you’ve ever worked in cybersecurity, you know that defense is a team sport. The difference between every win and loss is directly related to the strength, speed, and agility of our teams — and the systems we engineer and operate. When thinking about the future of cybersecurity, our first thought is often technology […]