CYBERSECURITY FORUM 2017
Thursday, January 5
Venetian, Level 4, Lando 4301
Battening Down the Hatches: Data and Devices
The days of simple anti-virus protection are over. We need better tools to keep our connected devices safe and secure. We’ll look at three strategies that are gaining traction today: end-point protection, secure browsers and apps protection.
Securing End Users Within an Organization
While volume of high-profile data breaches appears to be shrinking, attackers are evolving approaches to compromise the weakest link in an organization’s security posture – end users. Learn what will be the biggest threats in 2017 and how to avoid them.
Promoting Better Information Security Hygiene
You floss every day, right? Well then, you probably cut corners on your data hygiene, too. Get on our regimen and learn proper password protection, authentication and proactive defense for you and your company.
Password Protection, Authentication and New Exploits
Phishing, fraud and identity theft grow more insidious. New password protection schemes and multi-step authentication can help.
Inside a Cyber Attack
Spend a day in the life of the CEO, CMO, CSO, Legal Counsel and PR team when a cyber incident hits a company. Learn what it takes to get through with your data (and reputation) intact.
Evolving Threats in a Connected World
The latest threats are coming from many places, including IoT, more sophisticated ransomware, and exploits from insecure web applications. In these sessions, we will explore how everything from cars to light bulbs to industrial systems have been compromised.
Regulation and Enforcement in Cybersecurity
With everyone from the DNC to Ashley Madison having their data exploited you’d think we’d have seen everything? We’ll give you a look at the web’s most frightening exploits and what regulators and law enforcement can do to help.
Inside the Mind of the Hacker
In order to better anticipate how to protect our networks, we need to start thinking like a typical hacker. In these hands-on sessions, we’ll see how they breach databases, use the dark web and penetrate our networks.
Training the Next Generation Security Workforce
Conventional wisdom says “If you want a job, go into computing; if you want a job for life, go into cybersecurity.” What are the skills that your company needs to cultivate a strong cyber-secure workforce?
Cybersecurity Starts at the Top
You can wind up as a news headline or with lost revenues or you can make cybersecurity a part of your corporate DNA. Who’s getting it right and why?