VPNs: Who, What, Why, When, Where and HowBen's LinkedIn Joe's LinkedIn
Explaining the technology and options behind modern VPN offerings, and showing how to build once programmatically in AWS with a provided deployment script.
Data Resilience: When the Internet isn't ForeverLinkedIn
The presentation will discuss long-term data resilience, both online and offline. It will go over how data storage mediums, standards compatibility, and server availability impact our ability to ensure information is available for decades to come.
Purpose Built Security : Aligning operations to meet business needs at every levelLinkedIn
An effective information security program is equally about which controls are implemented as much as it is about how well they’re operating. Using the backdrop of building a global information security program at a Fortune 500 company, we’ll talk about how we determine the right people, process, and technology needed to secure the business and how you can use the same methodology to decide on what’s “right” at any level of the program.
Cyber AI and Machine LearningLinkedIn
With the growing need for cybersecurity for companies globally, this talk will take a dive into the how Machine Learning and AI could be used to help alleviate that load.
What Happens In Vegas Is Cyber!LinkedIn
This panel provides a view of emerging cybersecurity tools, techniques and processes. Las Vegas is known for DefCon and BlackHat annual conferences. There is much more to learn about how cyber is applied in Las Vegas and in the broader community, and what students can do to learn about these emerging cyber trends. Our panel includes cybersecurity leaders in Southern Nevada. This talk includes an interactive Q&A portion. Come join us for this engaging conversation!
Network and Endpoint SecurityLinkedIn
Cybersecurity had been seen as either network or endpoint security despite public or private cloud. As the cyber attacks are getting sophisticated, a new approach and mindset is also warranted! During this talk, we will share insights about network and endpoint security. The differences of two sides of the spectrum. How network security provides you the width and endpoint security the depth of detection, prevention and remediation of cyberattacks.
Log4j Deep DiveLinkedIn
Right now businesses are rushing to patch the recently discovered Log4j software vulnerability. The malware has the potential to cripple business by exploiting a little know vulnerability that exists in Java Class files. Join me as I do a deep dive on Log4j by providing an overview of the exploit, what it's being used for, why it is difficult to detect and some ideas for improving detection.
Alice Through the Write Blocker - The Essentials of Digital ForensicsLinkedIn
The Essentials of how to Image Evidence, track, and basic analysis in a theoretical ransomware group case. (Or Corporate Espionage. Or APT.)"
What Infosec in Oil & Gas can Teach us About Infosec in HealthcareLinkedIn
One advantage of working for a consultancy is the constant exposure to a variety of organizations in a variety of industries. This has given the speaker, Damon J. Small, an appreciation for the importance of not only understanding the challenges faced by clients in protecting their information assets, but also understanding those challenges in the context of the business in which they exist. It is never enough to simply tell a client, ""I hacked all your things, now go fix it."" Rather, the successful consultant must also help the client understand the ramifications of each finding and how to prioritize mitigation efforts given that neither time nor money are infinite. To illustrate these points, the speaker will present several information security-related problems that have been successfully taken on by oil and gas clients. The speaker has learned that these problems are very similar to specific challenges faced by healthcare organizations, despite the fact that those industries are very unique to one another. The healthcare industry faces fiscal hurdles that energy companies generally do not, which makes it difficult for them to adapt as quickly. The speaker hopes that his analysis will help the audience learn from the experiences of other organizations in a way that will allow them to strategically align information security goals with current cyber threats more efficiently.
Decentralized Applications and Peer to Peer CommunicationsLinkedIn
With current Blockchain Technologies and developments in Web3, developers and users worldwide are innovating new ways to distribute compute power, access off-chain data in real time, and mechanisms in place to incentivize adoption of these new developments.