Докладчики

Сортировать по
Новизне
Популярности
1-30 из 177
Фильтр
Estelle Feider-Blazer
Engineering Leadership Development Program в Xylem Inc.
baseline (configuration management), cloud computing, competitive advantage, computer security, cyber security, cyberattack, design, digital transformation, drinking water, economic inequality, evaluation, future-proof, ics, ics certification, incident management, industrial control systems, industrial security, information, infrastructure, internet of things, market segmentation, nerc, nerc certification, nerc cip, patch (computing), phishing, reclaimed water, sanitation, sans ics, sans institute, sansics, scada, supply chain, system, threat model, water and wastewater industrial automation, water and wastewater infrastructure, water supply, water supply network, water utilities
Kenneth Crowther
Product Security Leader в Xylem Inc.
baseline (configuration management), cloud computing, competitive advantage, computer security, cyber security, cyberattack, design, digital transformation, drinking water, economic inequality, evaluation, future-proof, ics, ics certification, incident management, industrial control systems, industrial security, information, infrastructure, internet of things, market segmentation, nerc, nerc certification, nerc cip, patch (computing), phishing, reclaimed water, sanitation, sans ics, sans institute, sansics, scada, supply chain, system, threat model, water and wastewater industrial automation, water and wastewater infrastructure, water supply, water supply network, water utilities
Reem Al-Shammari
CISO в Kuwait Oil Company
analytics, authentication, chief information security officer, cisos, computer network, computer security, cyber security, cyberattack, cyberwarfare, dc universe, district of columbia water and sewer authority, electrical engineering, electrical grid, ics, ics certification, industrial control systems, industrial security, information security, investment, investor, natural gas, nerc, nerc certification, nerc cip, patch (computing), q+a (australian talk show), ransomware, regulatory compliance, risk, safety, sans ics, sans institute, sansics, scada, telecommuting, touchpoint, value chain, vulnerability (computing), waste
Thomas Kuczynski
President в Blue Drop, LLC
analytics, authentication, chief information security officer, cisos, computer network, computer security, cyber security, cyberattack, cyberwarfare, dc universe, district of columbia water and sewer authority, electrical engineering, electrical grid, ics, ics certification, industrial control systems, industrial security, information security, investment, investor, natural gas, nerc, nerc certification, nerc cip, patch (computing), q+a (australian talk show), ransomware, regulatory compliance, risk, safety, sans ics, sans institute, sansics, scada, telecommuting, touchpoint, value chain, vulnerability (computing), waste
Annessa McKenzie
VP of Supply Chain & Chief Security Officer в Calpine
analytics, authentication, chief information security officer, cisos, computer network, computer security, cyber security, cyberattack, cyberwarfare, dc universe, district of columbia water and sewer authority, electrical engineering, electrical grid, ics, ics certification, industrial control systems, industrial security, information security, investment, investor, natural gas, nerc, nerc certification, nerc cip, patch (computing), q+a (australian talk show), ransomware, regulatory compliance, risk, safety, sans ics, sans institute, sansics, scada, telecommuting, touchpoint, value chain, vulnerability (computing), waste
Paul Stockton
President в Paul N Stockton LLC
analytics, authentication, chief information security officer, cisos, computer network, computer security, cyber security, cyberattack, cyberwarfare, dc universe, district of columbia water and sewer authority, electrical engineering, electrical grid, ics, ics certification, industrial control systems, industrial security, information security, investment, investor, natural gas, nerc, nerc certification, nerc cip, patch (computing), q+a (australian talk show), ransomware, regulatory compliance, risk, safety, sans ics, sans institute, sansics, scada, telecommuting, touchpoint, value chain, vulnerability (computing), waste
Andy Bochman
Resident Senior Fellow в Idaho National Laboratory
adolescence, analytics, automation, battery management system, blockchain, business continuity planning, circuit breaker, combined cycle power plant, communication, computer hardware, computer security, critical infrastructure, cyber risk, cyber security, cyber tools, cyberattack, electric battery, electricity generation, firmware, gas turbine, ics, ics certification, industrial control systems, industrial security, national security, nerc, nerc certification, nerc cip, power station, sans ics, sans institute, sansics, scada, science, security, server (computing), steam, system
Gus Serino
Control Systems Engineer в Dragos, Inc.
actuator, automation, bluetooth, computer network, computer security, cyber security, cyber-physical safety systems, cyberattack, ics, ics certification, industrial control systems, industrial security, infrastructure, infrastructure security, instrumentation, nerc, nerc certification, nerc cip, proactive cyber defence, process control, programmable logic controller, psychological resilience, relay, risk, safety, sans ics, sans institute, sansics, scada, sewage treatment, switch, telemetry, valve, water hammer, water quality, water supply, water supply network, water utility security, zigbee
Andrew Hildick-Smith
Principal в OT Sec, LLC
actuator, automation, bluetooth, computer network, computer security, cyber security, cyber-physical safety systems, cyberattack, ics, ics certification, industrial control systems, industrial security, infrastructure, infrastructure security, instrumentation, nerc, nerc certification, nerc cip, proactive cyber defence, process control, programmable logic controller, psychological resilience, relay, risk, safety, sans ics, sans institute, sansics, scada, sewage treatment, switch, telemetry, valve, water hammer, water quality, water supply, water supply network, water utility security, zigbee
Stuart Madnik
Professor of Engineering Systems в Massachusetts Institute of Technology
board of directors, computer security, coronavirus disease 2019, covid-19 pandemic, cyberattack, cybercrime, cybersecurity, cyberwarfare, dark web, door, equifax, fire drill, hacker, hotel, news, nothing, organization, prayer, resource, security, space, technology, telecommuting, university of cambridge, videotelephony, weapon
Amir Husain
Founder and CEO в SparkCognition
affective computing, ai, air traffic control, aircraft, algorithm, artificial general intelligence, artificial intelligence, artificial neural network, automation, autonomy, bp, brevan howard, buffer overflow, call centre, chaos theory, chatbot, china, climate change, climate change mitigation, complexity, computer science, computer security, computing, consciousness, customer service, cyberattack, darpa, database, decision-making, deterrence theory, ecology, embedded system, engineering, facebook, federal aviation administration, forecasting, global positioning system, ibm, impact, infrastructure, innovation, integer overflow, intelligence, internet, it, joint venture, knowledge worker, love, machine learning, march capital, military science, mind, mobile phone, natural language processing, natural-language generation, nature, ooda loop, parking lot, predictive maintenance, problem solving, programmer, reason, reinforcement learning, rejected takeoff, risk, robotics, sap, self-driving car, sentience, simulation, social media, software , sparkcognition, supply chain, sustainability, synchronization, synthetic data, technology, training, validation, and test sets, transparency (behavior), unmanned aerial vehicle, war, watson (computer)
Bipul Sinha
Co-Founder & CEO в Rubrik
adolescence, bank, cloud computing, community, concept, creativity, culture, cyberattack, data management, database, general data protection regulation, innovation, investor, it, leadership, market (economics), negotiation, risk, rubrik, satellite, security, social norm, startup company, strategic management, team, telecommuting, touchpoint, venture capital
Alejandro De La Torre
Vice President в Poolin
aesthetics, android (operating system), bitcoin, blog, book, brand, cash, china, coinbase, collateral (finance), cryptocurrency, cryptographic hash function, cyberattack, fee, interest, ios, linux, mining, mining pool, money, password, twitter, united states
Sunil James
Senior Director в Hewlett Packard Enterprise
agnosticism, ai, belief, business, cloud computing, computer data storage, computer security, computing, cross-platform software, cyberattack, engineering, hewlett packard enterprise, hewlett-packard, hpe, hpe discover, it, kubernetes , news, nist cybersecurity framework, open-source software, organization, organized crime, proliant, ransomware, reason, security, server (computing), space, understanding
Manoj Nair
GM в Metallic.io
api, application software, backup, business, cloud computing, cloud storage, commvault, computer, cost, cyberattack, dave vellante, endpoint security, enterprise software, john furrier, kubernetes , luck, matter, microservices, microsoft, nothing, patch (computing), productivity, ransomware, siliconangle, siliconangle inc, siliconangle media inc, snapshot (computer storage), software , tax, thecube, wikibon, zoom (software)
Sam Werner
Vice President, Product and Business Leader в IBMStorage
#thecube, @thecube, amazon web services, analytics, apache hadoop, api, backup, big data, bit, central processing unit, cloud computing, computer data storage, computer network, cyberattack, data center, data migration, dave vellante, dell, design, digital transformation, disaster recovery, dynamic infrastructure, encryption, general data protection regulation, ibm, ibm cloud computing, information privacy, infrastructure as code, jeff frick, john furrier, knowledge, kubernetes , microservices, microsoft azure, mind, mobile app, product lifecycle, provisioning (telecommunications), ransomware, sam werner, server (computing), siliconangle, siliconangle inc, siliconangle media inc, single source of truth, software , software-defined storage, stu miniman, thecube, truth, vmware, vmworld, vmworld 2020, wikibon
Andrew Conway
General Manager Security Marketing в Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
Irina Nechaeva
Senior Marketing Director в Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
Tom Burt
Corp. VP, Customer Security & Trust в Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
Alym Rayani
General Manager, Microsoft Compliance Marketing в Microsoft
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, google chrome, igfy21q3, ignite, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2021, microsoft powerpoint, mobile app, ms ignite, ms ignite 2021, msft ignite, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
Vasu Jakkal
CVP Microsoft Security, Compliance & Identity в Element
adam baron, adam harbour, adwait (aj) joshi, amazon web services, amelie darchicourt, analytics, andrew conway, android (operating system), ann johnson, ashish kapila, authentication, authenticator, caleb baker, carissa broadbent, cloud computing, computer security, corina feuerstein, cyberattack, cybercrime, fireeye, future proofing for diversity in tech | igl124, google chrome, ig20, igfy21q3, igl124, ignite, ignite 2020, ignite 2021, ios, jeffrey bley, jessica afeku, joanna harding, key05, keynote, michael grenetz, microsoft, microsoft account, microsoft azure, microsoft edge, microsoft excel, microsoft ignite, microsoft ignite 2020, microsoft ignite 2021, microsoft ignite live, microsoft powerpoint, mobile app, ms ignite, ms ignite 2020, ms ignite 2021, msft ignite, msft ignite 2020, msft ignite 2021, multi-factor authentication, office 365, password, principle of least privilege, security, security for all | key05, vasu jakkal, web browser, web portal, world wide web
David Severski
Information security data scientist в Cyentia Institute
apple inc., average, central tendency, computer security, cyber insurance, cyberattack, data breach, density, economies of scale, economy of the united states, externality, facebook, flood, health insurance portability and accountability act, insurance, mean, payment card industry data security standard, policy, privacy, risk, risk management, supply chain, traffic collision, valuation (finance)
Wade Baker
Collegiate Professor of Integrated Security в Virginia Tech
apple inc., average, central tendency, computer security, cyber insurance, cyberattack, data breach, density, economies of scale, economy of the united states, externality, facebook, flood, health insurance portability and accountability act, insurance, mean, payment card industry data security standard, policy, privacy, risk, risk management, supply chain, traffic collision, valuation (finance)
Eve Kilel
Cyber Security Engineer at Safaricom PLC and Co-Founder в Shehacks_KE
automated teller machine, blockchain, computer security, conversation, cyberattack, cybercrime, education, expert, identity theft, information and communications technology, information sensitivity, innovation, m-pesa, mentorship, mobile security, one-time password, personal data, personal identification number, phishing, research, sim card, social engineering (security), telecommunication, vulnerability (computing), web application
Laura Tich
Founder в SheHacks_KE
automated teller machine, blockchain, computer security, conversation, cyberattack, cybercrime, education, expert, identity theft, information and communications technology, information sensitivity, innovation, m-pesa, mentorship, mobile security, one-time password, personal data, personal identification number, phishing, research, sim card, social engineering (security), telecommunication, vulnerability (computing), web application
Salam Bani-Ahmed
Lead Engineer, Power Systems Cybersecurity в Eaton
ai, ai4, ai4 2020, artificial, artificial intelligence, business continuity planning, communication, computer intelligence, computer security, condom, cryptography , cyber, cyber attack, cyber resilience, cyber resiliency, cyber security, cyber threats, cyber-physical system, cyberattack, cybersecurity, cyberwarfare, data center, data science, digitization, dispatch (logistics), distributed generation, dog, eaton, ecological resilience, emergency, federal bureau of investigation, insurance, intelligence, law, learning, machine, machine learning, ml, question, risk, salam baniahmed, scada, security, utility
Amin Tora
Principal Cyber Security Analyst в Aramco
active defense, ai, ai4, ai4 2020, ai4 2021 cybersecurity summit, algorithm, amin tora, aramco, artificial, artificial general intelligence, artificial intelligence, awareness, computer intelligence, computer security, cyber, cyber security, cyberattack, cybersecurity, cybersecurity operations, data science, deep learning, defense, feature learning, function (mathematics), information, intelligence, learning, machine, machine learning, mathematical model, mathematics, mind, ml, neural network, noise reduction, radar, reason, red team, reduction (complexity), security, self-driving car, situation awareness, statistical classification, supervised learning, threat detection, unsupervised learning
Felix Asare
Deputy Chief Information Security Officer в Allianz Technology
ai, ai4, ai4 2020, alphazero, analytics, antivirus software, artificial, artificial intelligence, chief financial officer, cisa, commercial off-the-shelf, computer security, computer virus, cyber and infrastructure security agency, cyberattack, cybersecurity, dha, emerging technologies, future point of view, greg wilson, information security, intelligence, knowledge, learning, machine, machine learning, malware, mark stamford, martin stanley, ml, occamsec, outsourcing, penetration test, phishing, pioneer natural resources, reason, reverse engineering, risk, risk assessment, scott klososky, software , system, united states department of homeland security, use case
Gregory Wilson
Chief Information Security Officer в Pioneer Natural Resources Company
ai, ai4, ai4 2020, alphazero, analytics, antivirus software, artificial, artificial intelligence, chief financial officer, cisa, commercial off-the-shelf, computer security, computer virus, cyber and infrastructure security agency, cyberattack, cybersecurity, dha, emerging technologies, future point of view, greg wilson, information security, intelligence, knowledge, learning, machine, machine learning, malware, mark stamford, martin stanley, ml, occamsec, outsourcing, penetration test, phishing, pioneer natural resources, reason, reverse engineering, risk, risk assessment, scott klososky, software , system, united states department of homeland security, use case
Martin Stanley
Senior Advisor for Artificial Intelligence в Cybersecurity and Infrastructure Security Agency
ai, ai4, ai4 2020, alphazero, analytics, antivirus software, artificial, artificial intelligence, chief financial officer, cisa, commercial off-the-shelf, computer security, computer virus, cyber and infrastructure security agency, cyberattack, cybersecurity, dha, emerging technologies, future point of view, greg wilson, information security, intelligence, knowledge, learning, machine, machine learning, malware, mark stamford, martin stanley, ml, occamsec, outsourcing, penetration test, phishing, pioneer natural resources, reason, reverse engineering, risk, risk assessment, scott klososky, software , system, united states department of homeland security, use case
1 2 3 4 5 6