AustinCyber.Show Blog Posts
Writing Cyber Policies that Aren’t Miserable for Everyone
Bill Alderson
|Watch Full Session Video Watch 2 Minute Clip Nick Leghorn, Director of Application Security, The New York Times Nick's Session ...
The Art of Cyberwarfare Insights from the Author Jon DiMaggio
Bill Alderson
|Watch Video: Watch Jon's Session Video Austin Cyber Show Session: The Art of Cyberwarfare Author Jon DiMaggio Session Title: The ...
New Mathematical Models for Forecasting Cyber Attacks
Bill Alderson
|Watch Video: Watch Charlene's Session Video Session by Charlene Deaver-Vazquez of FISMACS.com Title: New Mathematical Models for Forecasting Cyber Attacks ...
Cyber Book – New Releases: Authors Featured at Austin Cyber Show
Bill Alderson
|The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through their publications. ...
Managing Tactical US Military Networks: HOPE is Not a Plan
Bill Alderson
|Watch Col Wills Session Video Colonel (COL) David Wills, U.S. Army, retired 2021,as the Deputy Director for Command, Control, Communications, ...
Cliff Notes from a CISO Author’s Perspective
Bill Alderson
|Watch Gary's Session Videoo Austin Cyber Show Session by Gary Hayslip Author CISO Executive Primer Title: Cliff notes from a ...
Anatomy of a Cyber Attack
Bill Alderson
|Full 37 Minute Video Most cyber professionals don't have the opportunity to see an actual cyberattack play out. They understand ...
Defend the “when” with Network Intelligence
Bill Alderson
|Short Highlight Video Full Session Video Visit ExtraHop.com for more information. Defend the “When” with Network Intelligence Perhaps the oldest ...
Unleash the Full Potential of Network Detection and Response NDR
Bill Alderson
|Full 38 Minutes Session Video Unleash the Full Potential of Network Detection and Response Consider the anatomy of a cyberattack. ...
Mother’s Day Lost Wallet Challenge
Bill Alderson
|As your lovely mother walks out the door on this mother’s day, she backs out of the driveway to leave, ...
CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh
Bill Alderson
|CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...
Day / Week / Month in the Life of a CISO: Sameer Sait & Mustapha Kebbeh
Bill Alderson
|CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...
The Big Disruption in Cybersecurity
Bill Alderson
|The Big Disruption in Cybersecurity Security awareness & training programs and content has improved dramatically in recent years, yet security ...
Data Verses Measurement: Metrics are Not Enough
Bill Alderson
|Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and ...
30+ AustinCyber.Show Speakers and Sessions in Under 60 Seconds
Bill Alderson
|See it all in 55 seconds. Then pick the sessions of interest for the list of blogs below. In random ...
Assigning Cost to Security Risk
Bill Alderson
|Assigning Cost to Security Risk. The importance of communicating cyber risk in financial terms to the board is growing day ...
Networked Medical Device Connectivity Security
Bill Alderson
|Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patient monitors, ...
Social Engineering Cyber Attacks
Bill Alderson
|Social Engineering Attacks: Why do we fall for them and what we can do about it. By Dr. Ian Wilkinson ...
Cyber Incident Response Case Study
Bill Alderson
|In this session Brian Clinkenbeard, one of the prolific and beloved security gurus of the industry, will look at exposing ...
Mystery Solved: Deep Packet Security Analysis
Bill Alderson
|Mystery Solved: Deep Packet Security Analysis TLS version and cipher suite are the two most critical parameters negotiated during the ...
Constantly Changing Cybercrime
Bill Alderson
|The nature of cybercrime is constantly changing and becoming more difficult to defend. This session will evaluate some of these ...
Navigating Global Public Web Server Privacy Laws
Bill Alderson
|Protecting customer's data privacy has become a new source of stress for any company with a web presence. Compounding that, ...
Five Ways Attackers Leave Ransomware Vulnerable to Detection
Bill Alderson
|One Minute Highlight Clip Full 36 Minute Session Five Ways Attackers Leave Ransomware Vulnerable to Detection Ransomware has evolved and ...
Reclaiming Your Identity
Bill Alderson
|Reclaiming Your Identity Learn how to claim your identity before criminals do, or reclaim your identity after criminals have used ...
Cybersecurity over the horizon: the future of cybersecurity
Bill Alderson
|We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for organizations facing new ...
What Drives Security Convergence?
Bill Alderson
|This session will report on some observations about how the degree of convergence of physical and cyber security is evolving ...
Remaining Ransom Aware: What to Do When One Gets Past the Goalie
Bill Alderson
|Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best approached from a ...
Building a Security Team that Never Says No
Bill Alderson
|Building a Security Team that Never Says “No” One of the most prevalent perceptions of any security team is that ...
Building a Modern SOC Requires Attack Surface Validation
Bill Alderson
|Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires continuous validation of the ...
Security Leaders Use Ranges & Simulation to Improve Their Security Posture
Bill Alderson
|Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what ...
Double Espresso Morning Cyber Brief to Start the Day
Bill Alderson
|May 10-11 2022 Session by James Azar CyberHub Podcast Title: Double Espresso Morning Cyber Brief to Start the Day Join ...
Breach Defense Certificate
Bill Alderson
|Breach Defense is one of five Certificates offered. Breaking down the anatomy of a massive breach starts with a diagram ...
Exfiltration Prevention Certificate
Bill Alderson
|The fundamentals of Exfiltration prevention start with Data Loss Prevention DLP. Below is a diagram of various DLP methods designed ...
IETF’s New “TCP” QUIC Certificate
Bill Alderson
|Near 50 years ago Internet Protocol Pioneers imagined a network that would interconnect people around the world. Little by little ...