deepak

Writing Cyber Policies that Aren’t Miserable for Everyone

Watch Full Session Video Watch 2 Minute Clip Nick Leghorn, Director of Application Security, The New York Times Nick’s Session 1: Writing Policies That Aren’t Miserable for Everyone Involved Every organization has policies, and for good reason. Consistent decision making, standardized approaches, and clearly defined roles and responsibilities makes sure that everyone understands how to …

Writing Cyber Policies that Aren’t Miserable for Everyone Read More »

The Art of Cyberwarfare Insights from the Author Jon DiMaggio

Watch Video: Watch Jon’s Session Video Austin Cyber Show Session: The Art of Cyberwarfare Author Jon DiMaggio Session Title: The Art of Cyberwarfare Insights from the Author Jon DiMaggio Join us as Jon share insights on understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain …

The Art of Cyberwarfare Insights from the Author Jon DiMaggio Read More »

New Mathematical Models for Forecasting Cyber Attacks

Watch Video: Watch Charlene’s Session Video Session by Charlene Deaver-Vazquez of FISMACS.com Title: New Mathematical Models for Forecasting Cyber Attacks Probability theory gives us the ability to quantify risk and forecast events in a predictable way. These methods have been used in epidemiology, seismology, finance, and even space and nuclear safety analysis. Today a new …

New Mathematical Models for Forecasting Cyber Attacks Read More »

Cyber Book – New Releases: Authors Featured at Austin Cyber Show

The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through their publications. Join this free Cybersecurity conference via zoom or in person. Register now! Gary Hayslip, author of Executive Primer, The Executive’s Guide to Security Programs presents Tuesday, May 10 at 11am CT, with the session “Cliff …

Cyber Book – New Releases: Authors Featured at Austin Cyber Show Read More »

Managing Tactical US Military Networks: HOPE is Not a Plan

Watch Col Wills Session Video Colonel (COL) David Wills, U.S. Army, retired 2021,as the Deputy Director for Command, Control, Communications, and Computers (C4) Systems, U.S. Strategic Command (USSTRATCOM). As the Deputy Director, C4 Systems, COL Wills is responsible for providing and assuring global-integrated C4 systems capabilities for the full spectrum of assigned missions. The USSTRATCOM …

Managing Tactical US Military Networks: HOPE is Not a Plan Read More »

Cliff Notes from a CISO Author’s Perspective

Watch Gary’s Session Videoo Austin Cyber Show Session by Gary Hayslip Author CISO Executive Primer Title: Cliff notes from a CISO Author’s Perspective Join us as Gary shares insights from a CISO Perspective The CISO Desk Reference Guide Executive Primer is written primarily for the CISO’s colleagues. The primary perspective of this book is one …

Cliff Notes from a CISO Author’s Perspective Read More »

Defend the “when” with Network Intelligence

Short Highlight Video Full Session Video Visit ExtraHop.com for more information. Defend the “When” with Network Intelligence Perhaps the oldest cliché in cybersecurity is “it’s not if, but when you get compromised.” Cliché, yes, but also true. So, why then, are we all focused on defending the “if”? In this presentation, Bryan Lares will explore …

Defend the “when” with Network Intelligence Read More »

Unleash the Full Potential of Network Detection and Response NDR

Full 38 Minutes Session Video Unleash the Full Potential of Network Detection and Response Consider the anatomy of a cyberattack. Look at gaps in security tools and cost of breach. Current challenges, gaps and different approaches to NDR. Scalable deep packet inspection requirements and considerations. Application of machine learning and encryption for the next generation …

Unleash the Full Potential of Network Detection and Response NDR Read More »

Scroll to Top