“Table Stakes” in the Development and Deployment
of Secure Medical Devices | Oct. 22, 2018
Basic Threat Modeling and Risk Assessment Fotios Chantzis |
What are the chances? Lessons learned from 50 years of predicting risk. Douglas Clare |
DevSecOps For Practitioners | Oct. 22, 2018
Why Security needs to be at the DevOps Table Chris Perkins |
GDPR — General Data Protection Regulation | Oct. 22, 2018
5 Steps Toward GDPR Compliancy in Practice Pekka Vepsäläinen |
Information Security Best Practices and GDPR Douglas Garrison |
Cyber Security for Small and Mid-size Businesses | Oct. 23, 2018
Communication Strategies and Lessons Learned Loren Dealy Mahler |
Industry Standard Frameworks: What You Need to Know and How to Use Them Amos Aesoph |
Full Summit | Oct. 23, 2018
The Top 10 Things You Must Do to Protect Security Systems from Cyber Attacks David Tyson |
Full Summit | Oct. 24, 2018
The Anatomy of an Email-Borne Attack Brandon Reid |
Economics of Cybersecurity Scott Borg |
Legislative Cyber Security Briefing: IT Security Governance Tony Sager |