
Are Cybercriminals Using Your Website to Cash In on COVID?
KEYNOTE TITLE: Are Cybercriminals Using Your Website to Cash In on COVID? With more business than ever transacting online, cybercriminals are seizing the opportunity to capitalize. We will review current threat research to show the recent shift in attack focus across several industries and lead a discussion on how cybercriminals are using sophisticated automation tools and…

How to Succeed at Threat Hunting and Incident Response
Speaker: Pete Anderson – Data at Rest, Motion, – Analyze Data – Network Traffic Analysis – TLS 1.3 – Wire Data – Logs – Incident Response

Old Dead Dudes and Threat Hunting by Evan Strickland
Intro: What are the goals of Cyber Security Analysis and why should we pursue it in the first place? What are the criteria for success? Where are we heading? To get you there, this talk will help you understand: Cyber Security and the Art of Argument The Discipline of Decision The Philosophy of Cyber Security…

What do you mean by Security in the cloud? by Christian Fontaine

VIAVI – The importance of Packets in Security Forensics
Jason Cornwell Sr. Solutions Architect – VIAVI Solutions Title: The Importance of Packets in Security Forensics Abstract: Prevention and detection are only two facets of a good security posture. Once an event happens, then the investigation phase begins. Bio: Jason Cornwell brings over 20 years experience in network performance management and diagnostics to his clients. With deep…
The Connected Worker and the Enterprise of Things
Todd Berger, Sr. Director Technical Solutions, BlackBerry The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off-campus mobile workers who are becoming…