CYBERSECURITY FORUM 2016
Wednesday, January 6
Venetian, Level 4, Lando 4301
Breakfast and Welcome to the CYBERSECURITY FORUM
Join us for breakfast as we kick-off the 2016 CYBERSECURITY FORUM.
Sponsored by CSX
Effective cyber security requires knowledge and understanding of the capabilities and intent of threat actors. Who are they? What do they want? What can they do? Find out what kind of actionable intelligence will help protect your company.
IOT: The Biggest Security Threat to Everything
How Smart is Your Device?
Intelligent toasters. Robotic cars. Drone deliveries. The Internet of Things will revolutionize the way we live and work. New connected devices promise to improve our daily lives, from smart homes to smarter workplaces. But at what cost to cyber security?
The Cyber Blacklist: Threats & Countermeasures for Data Security
At the heart of most data thefts is lax cyber security: a broad term that will cease to intimidate you after this presentation. You will come away with an actionable Blacklist of next steps to protect your data, devices and identity.
Lunch & Networking Sponsored by Dell
USA’s MR. ROBOT: Is Truth Stranger than Fiction?
USA’s hit series, MR. ROBOT, follows a young programmer who works as a cyber security engineer by day and a vigilante hacker by night. MR. ROBOT show consultants and cyber security experts explore how reality translates into authentic storytelling.
When Bad Things Happen to Good Companies
New cyber threats require new strategies. In our increasingly connected world, effective cyber security requires a multi-discipline approach that coordinates all of a company’s security functions. Learn about the newest ways for improving security readiness and response.
Cyber Security Starts at the Top
CEOs and boards are being held accountable for cyber breaches. What do they need to know to keep their companies secure? How can you effectively communicate the intricacies of cyber security to the C-suite?
Hacking for the Better Good
Hear from white hats and ethical hackers who have identified security weaknesses in computer systems and devices. How do they find what others have missed?
Hosted by Dell