AustinCyber.Show Blog Posts
Writing Cyber Policies that Aren’t Miserable for Everyone
| Bill Alderson
Watch Full Session Video Watch 2 Minute Clip Nick Leghorn, Director of Application Security, The New York Times Nick's Session ...
The Art of Cyberwarfare Insights from the Author Jon DiMaggio
| Bill Alderson
Watch Video: Watch Jon's Session Video Austin Cyber Show Session: The Art of Cyberwarfare Author Jon DiMaggio Session Title: The ...
New Mathematical Models for Forecasting Cyber Attacks
| Bill Alderson
Watch Video: Watch Charlene's Session Video Session by Charlene Deaver-Vazquez of FISMACS.com Title: New Mathematical Models for Forecasting Cyber Attacks ...
Cyber Book – New Releases: Authors Featured at Austin Cyber Show
| Bill Alderson
The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through their publications. ...
Managing Tactical US Military Networks: HOPE is Not a Plan
| Bill Alderson
Watch Col Wills Session Video Colonel (COL) David Wills, U.S. Army, retired 2021,as the Deputy Director for Command, Control, Communications, ...
Cliff Notes from a CISO Author’s Perspective
| Bill Alderson
Watch Gary's Session Videoo Austin Cyber Show Session by Gary Hayslip Author CISO Executive Primer Title: Cliff notes from a ...
Anatomy of a Cyber Attack
| Bill Alderson
Full 37 Minute Video Most cyber professionals don't have the opportunity to see an actual cyberattack play out. They understand ...
Defend the “when” with Network Intelligence
| Bill Alderson
Short Highlight Video Full Session Video Visit ExtraHop.com for more information. Defend the “When” with Network Intelligence Perhaps the oldest ...
Unleash the Full Potential of Network Detection and Response NDR
| Bill Alderson
Full 38 Minutes Session Video Unleash the Full Potential of Network Detection and Response Consider the anatomy of a cyberattack. ...
Mother’s Day Lost Wallet Challenge
| Bill Alderson
As your lovely mother walks out the door on this mother’s day, she backs out of the driveway to leave, ...
CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh
| Bill Alderson
CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...
Day / Week / Month in the Life of a CISO: Sameer Sait & Mustapha Kebbeh
| Bill Alderson
CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...
The Big Disruption in Cybersecurity
| Bill Alderson
The Big Disruption in Cybersecurity Security awareness & training programs and content has improved dramatically in recent years, yet security ...
Data Verses Measurement: Metrics are Not Enough
| Bill Alderson
Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and ...
30+ AustinCyber.Show Speakers and Sessions in Under 60 Seconds
| Bill Alderson
See it all in 55 seconds. Then pick the sessions of interest for the list of blogs below. In random ...
Assigning Cost to Security Risk
| Bill Alderson
Assigning Cost to Security Risk. The importance of communicating cyber risk in financial terms to the board is growing day ...
Networked Medical Device Connectivity Security
| Bill Alderson
Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patient monitors, ...
Social Engineering Cyber Attacks
| Bill Alderson
Social Engineering Attacks: Why do we fall for them and what we can do about it. By Dr. Ian Wilkinson ...
Cyber Incident Response Case Study
| Bill Alderson
In this session Brian Clinkenbeard, one of the prolific and beloved security gurus of the industry, will look at exposing ...
Mystery Solved: Deep Packet Security Analysis
| Bill Alderson
Mystery Solved: Deep Packet Security Analysis TLS version and cipher suite are the two most critical parameters negotiated during the ...
Constantly Changing Cybercrime
| Bill Alderson
The nature of cybercrime is constantly changing and becoming more difficult to defend. This session will evaluate some of these ...
Navigating Global Public Web Server Privacy Laws
| Bill Alderson
Protecting customer's data privacy has become a new source of stress for any company with a web presence. Compounding that, ...
Five Ways Attackers Leave Ransomware Vulnerable to Detection
| Bill Alderson
One Minute Highlight Clip Full 36 Minute Session Five Ways Attackers Leave Ransomware Vulnerable to Detection Ransomware has evolved and ...
Reclaiming Your Identity
| Bill Alderson
Reclaiming Your Identity Learn how to claim your identity before criminals do, or reclaim your identity after criminals have used ...
Cybersecurity over the horizon: the future of cybersecurity
| Bill Alderson
We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for organizations facing new ...
What Drives Security Convergence?
| Bill Alderson
This session will report on some observations about how the degree of convergence of physical and cyber security is evolving ...
Remaining Ransom Aware: What to Do When One Gets Past the Goalie
| Bill Alderson
Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best approached from a ...
Building a Security Team that Never Says No
| Bill Alderson
Building a Security Team that Never Says “No” One of the most prevalent perceptions of any security team is that ...
Building a Modern SOC Requires Attack Surface Validation
| Bill Alderson
Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires continuous validation of the ...
Security Leaders Use Ranges & Simulation to Improve Their Security Posture
| Bill Alderson
Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what ...
Double Espresso Morning Cyber Brief to Start the Day
| Bill Alderson
May 10-11 2022 Session by James Azar CyberHub Podcast Title: Double Espresso Morning Cyber Brief to Start the Day Join ...
Breach Defense Certificate
| Bill Alderson
Breach Defense is one of five Certificates offered. Breaking down the anatomy of a massive breach starts with a diagram ...
Exfiltration Prevention Certificate
| Bill Alderson
The fundamentals of Exfiltration prevention start with Data Loss Prevention DLP. Below is a diagram of various DLP methods designed ...
IETF’s New “TCP” QUIC Certificate
| Bill Alderson
Near 50 years ago Internet Protocol Pioneers imagined a network that would interconnect people around the world. Little by little ...