![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_03.png) |
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_09.png) |
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_33.png) |
Welcome and Opening Remarks – Day 1
Col. Stefanie Horvath; Dave Notch |
National Policy Conversation
Matthew Rhoades
|
Cyber Operations and Intelligence Essentials for Leaders
Bob Stasio |
|
|
|
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_24.png) |
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_17.png) |
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_16.png) |
How Do You Deal With the Sheer Volume of Security Data
Peter Brecl |
Using Deception Techniques to Create Strong Detection
Tim Crothers |
Cybersecurity – How Much Is Enough?
Tony Sager |
|
|
|
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_07.png) |
![](https://www.cybersecuritysummit.org/wp-content/uploads/2018/12/CSS18_video_1023_slice_23.png) |
|
Panel – What’s Working – Information Across Companies and Industries |
The Top 10 Things You Can Do to Protect Security Systems from Cyber Attacks
David Tyson |
|
|
|
|