2019
Andre Mintz
Andre Mintz joined Red Ventures in 2017 to shape all aspects of our information security strategy and to mitigate data security-related risks. He plays a key role in protecting our partners and ensuring we’ve got a sophisticated framework that’s safe and ready to scale. Prior to joining Red Ventures, he was CISO and Head of […]
Stacy Moore
Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the significant changes it experienced during the previous year. They will also present examples of moniker research and how to make attribution to anonymized threat actors. Stacy Moore […]
Max Morris
Max M. Morris is the Senior Director of Cyber Defense and Response for Ally Bank. In his role, Max leads a group of cyber security professionals who run the company’s Security Operations Center, handle Cyber Security Incident Response, provide Threat Intelligence and Data Loss Prevention services as well as help drive Security Assessment efforts around […]
Owen Nearhoof
Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the significant changes it experienced during the previous year. They will also present examples of moniker research and how to make attribution to anonymized threat actors. Owen Nearhoof […]
Allen O'Rourke
This presentationl will discuss the patchwork of cybersecurity laws affecting US companies, including Europe’s recent General Data Protection Regulation (GDPR) and the upcoming California Consumer Privacy Act (CCPA), as well as the growth of lawsuits and government enforcement arising out of cyber incidents. In particular, the panel will explore how cybersecurity law has developed over […]
Sam Phillips
Abstract: Organizations’ approach to cybersecurity have matured and have recognized the necessity to perform enterprise risk management efforts. The NIST Cybersecurity Framework has significantly helped organizations communicate and structure the examination of important elements of enterprise cybersecurity. Underlying its efforts is the requirement to undertake a risk assessment effort. What are some of the broadly […]
Andrew Shortt
Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be encrypted before storing it in the cloud or where your application needs to manage the encryption and decryption of that data. The AWS Encryption SDK is a […]
Darren Shou
Abstract: We need to be talking about cyber safety rather than just security since the future of our industry will depend on our ability to engage users and arm them to make decisions against ever more sophisticated threats targeting them. Darren Shou is the VP, Research at Symantec. In this role, Darren leads the company’s […]
Yonatan Striem-Amit
Abstract: Yonatan Striem-Amit, will discuss the future of advanced, nation state threats as they continue to develop and move into the private sector. We will examine the recently discovered APT, named Operation Soft Cell, an advanced attack targeting several global telecommunications providers. Using the case study we will help you understand: How Operation Soft Cell […]
John Walsh
Abstract: New digital services and connected industrial controls systems continue to be at high risk from security breaches with subsequent impacts to consumer privacy and now personal safety. The convergence of IT and OT networks within the factory is being driven by overall competitiveness of the global manufacturing and automation markets forcing firms to connect […]