Here are a few of the speaker sessions and panels we have planned for October 27. Stay tuned, as more sessions will be announced!
NEW! Protecting Culture, Continuity, and Quality in a World of Rapid Change Brian Murphy, ReliaQuest
Some look at the rapidly changing world of IT security and see a workforce problem. Others see a workforce development opportunity. In this session, ReliaQuest CEO Brian Murphy will share strategies for designing a sustainable culture that thrives on challenge, adapts readily to change, and is built to grow. It centers on the development of specific mindset—one that turns the typical approach to IT security on its head.
The Benefits of Social Science Research for Cybersecurity Panel George Burruss of the University of South Florida
Cybersecurity pros often focus on the technical causes and solutions for cybercrime, but what about the human factor? How can we use our knowledge of criminal behavior and motivation to predict and prevent cybercrime?
Hacking the Supply Curve for Cybersecurity Talent Douglas Logan, US Cyber Challenge
The cybersecurity industry is in drastic need of highly skilled talent. How can we identify, train, and assess new talent? What are employers--and employees--looking for?
Behavioral Aspects/Human Elements: Cybersecurity Violations in Crowdsourcing Gert-Jan de Vreede and Agnieszka Onuchowska, University of South Florida
Crowdsourcing can be an effective problem-solver, but the practice is increasingly falling victim to disruptive elements. Explore the threats to crowdsourcing and ways to mitigate those threats.
Who is the "Weakest Link" in the US Mortgage Industry Cyber Supply Chain? Juliet Okafor, JD, Fortress Information Security
The mortgage industry trades massive amounts of sensitive personal data. Hear the shocking results of one team's study of the cyber risks posed by the mortgage industry supply chain.
Enterprise Cloud Security on a Start-Up Budget Jesse H. Webb, Avalon Healthcare Solutions
Learn how one start-up healthcare company leveraged Amazon Web Services and security best practices to build a secure, HIPAA-compliant healthcare data company poised for exponential growth.
Building and Analyzing Secure Cloud Architectures and Ecosystems Using Software Patterns Dr. Eduardo Fernandez-Buglioni, Florida Atlantic University
Patterns abstract good practices to define models that can be used to build new systems and evaluate existing systems. Learn how to create a catalog of security and misuse patterns, integrate these patterns into a security reference architecture, and extend that SRA to the cloud's ecosystem.
Classifying Phishing URLs Using Deep Recurrent Neural Networks Sergio Villegas, Easy Solutions, Inc.
Examine the astounding results that Villegas and his team achieved when they used URLs as input to machine learning models to predict whether a site might be a phishing site.
Cyberspace Threat Automation and Monitoring (CTAM) System Dr. Himanshu Upadhyay, Florida International University
Learn more about CTAM, a test technology to detect, analyze, and monitor malware behavior during cyberattacks in virtual environments; advanced instrumentation tools for control and monitoring of malware; fine-grained introspection using LibVMI technology; and data analytics using state-of-the-art machine-learning models.
"How do we get "Left of Boom?" Michael Pepin of NC4 Soltra
When faced with a cyberattack, we react. How can we get from being reactive to proactive using Cyber Threat Intelligence (CTI)?
The Cloud: An Opportunity to Revisit Security Kerry Long, IARPA
Large commercial clouds are changing the way organizations perform computing tasks and inspiring impressive innovations. Cybersecurity innovations, however, are less impressive. How can we use the cloud to reinvent cybersecurity?