deepak

CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh

CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO’s will talk about their experiences in leading and managing information security organizations. First they will discuss the day-to-day activities in the life of a CISO, followed by the more strategic and business-facing activities required to be successful …

CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh Read More »

Day / Week / Month in the Life of a CISO: Sameer Sait & Mustapha Kebbeh

CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO’s will talk about their experiences in leading and managing information security organizations. First they will discuss the day-to-day activities in the life of a CISO, followed by the more strategic and business-facing activities required to be successful …

Day / Week / Month in the Life of a CISO: Sameer Sait & Mustapha Kebbeh Read More »

Data Verses Measurement: Metrics are Not Enough

Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and completion times, and focus on building a comprehensive program that measures the full picture of human behavior in your organization. While most security leaders focus on tracking a set of KPIs, without context and correlation, …

Data Verses Measurement: Metrics are Not Enough Read More »

30+ AustinCyber.Show Speakers and Sessions in Under 60 Seconds

See it all in 55 seconds. Then pick the sessions of interest for the list of blogs below. In random order: Or http://austincyber.show/blog/ to choose them by picture. http://austincyber.show/writing-cyber-policies-that-aren-t-miserable-for-everyone/ http://austincyber.show/the-art-of-cyberwarfare-insights-from-the-author-jon-dimaggio/ http://austincyber.show/new-mathematical-models-for-forecasting-cyber-attacks/ http://austincyber.show/cyber-book-new-releases-authors-featured-at-austin-cyber-show/ http://austincyber.show/managing-us-military-networks-hope-is-not-a-plan/ http://austincyber.show/cliff-notes-from-a-ciso-author-s-perspective/ http://austincyber.show/anatomy-of-a-cyber-attack/ http://austincyber.show/defend-the-when-with-network-intelligence/ http://austincyber.show/unlease-the-full-potential-of-network-detection-and-response-ndr/ http://austincyber.show/mother-s-day-lost-wallet-challenge/ http://austincyber.show/ciso-day-in-the-life-of-ciso-s-sameer-sait-mustapha-kebbeh/ http://austincyber.show/iam-the-new-security-perimeter-do-grc-and-iam-teams-understand-their-symbiotic-relationship/ http://austincyber.show/the-big-disruption-in-cybersecurity/ http://austincyber.show/data-verses-measurement-metrics-are-not-enough/ http://austincyber.show/30-austincyber-show-speakers-and-sessions-in-under-60-seconds/ http://austincyber.show/assigning-cost-to-security-risk/ http://austincyber.show/networked-medical-device-connectivity-security/ http://austincyber.show/social-engineering-cyber-attacks/ http://austincyber.show/cyber-incident-response-case-study/ http://austincyber.show/mystery-solved-deep-packet-security-analysis/ http://austincyber.show/constantly-changing-cybercrime/ http://austincyber.show/navigating-global-public-web-server-privacy-laws/ http://austincyber.show/five-ways-attackers-leave-ransomware-vulnerable-to-detection/ http://austincyber.show/reclaiming-your-identity/ http://austincyber.show/cybersecurity-over-the-horizon-the-future-of-cybersecurity/ http://austincyber.show/what-drives-security-convergence/ http://austincyber.show/remaining-ransom-aware-what-to-do-when-one-gets-past-the-goalie/ …

30+ AustinCyber.Show Speakers and Sessions in Under 60 Seconds Read More »

Networked Medical Device Connectivity Security

Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patient monitors, infusion pump systems, ventilators, and a host of biomedical equipment are typically connected via hospital and healthcare facility Ethernet or Wi-Fi. The fact that they are connected to the network and potentially the Internet creates …

Networked Medical Device Connectivity Security Read More »

Scroll to Top