Events Add an event Speakers Talks Collections
 

Speakers on Cybersecurity

Learn from leading speakers on Cybersecurity sharing their perspectives, experience and insights.

Sort by
Newest
Trending
1-30 of 617
1-30 of 617
Filter
Davi Ottenheimer
Founder and President at Flyingpenguin LLC
access control, advanced encryption standard, algorithm, analytics, anger, antivirus software, authentication, axiom, boiler, business continuity planning, chatbot, computer data storage, computer network, cryptography , database, denial-of-service attack, dropbox (service), elon musk, end user, engine, ethics, facebook, gender, gender neutrality, general data protection regulation, global catastrophic risk, good and evil, google play, human subject research, idea, information security, intercontinental ballistic missile, internal combustion engine, judgment (law), key management, knowledge, lightweight directory access protocol, logic, machine learning, mongodb, multi-factor authentication, news, non-binary gender, nuclear warfare, operating system, password, privacy, privacy law, propaganda, reason, reliability engineering, replication (computing), security, security hacker, self-awareness, self-driving car, siri, statistics, steam engine, steam locomotive, surveillance, tesla, inc., theory, thought, top seven ai breaches, transparency (behavior), transport layer security, twitter, violence, vulnerability (computing)
Patrick Kiley
Principal Security Consultant at Rapid7
assembly language, backup, battery management system, bit, bluetooth, booting, can bus, compiler, computer file, contactor, cryptography , database, debugging, electric battery, electrical resistance and conductance, encryption, executable, firmware, inrush current, jtag, linux, nvidia, on the fly, over-the-air programming, password, penetration test, reason, resistor, security model, shunt (electrical), software , source code, stata, system on a chip, tegra, temperature, tesla autopilot, tesla model s, tesla, inc., trunk (car), upload, vehicle, voltage
Lauren X. Topelsohn
Partner at Mandelbaum Salsburg P.C.
attorney–client privilege, bench trial, common law, complaint, daubert standard, default judgment, deposition (law), discovery (law), evidence (law), expert witness, federal rules of evidence, jargon, jury, knowledge, lawsuit, non-disclosure agreement, prejudice (legal term), questioned document examination, salary, service of process, tampering with evidence, testimony, understanding, witness
Hoyt L. Kesterson II
Senior Security & Risk Architect at Avertium
attorney–client privilege, bench trial, common law, complaint, daubert standard, default judgment, deposition (law), discovery (law), evidence (law), expert witness, federal rules of evidence, jargon, jury, knowledge, lawsuit, non-disclosure agreement, prejudice (legal term), questioned document examination, salary, service of process, tampering with evidence, testimony, understanding, witness
Adrian Bednarek
Researcher at Overflow Labs, Inc
blockchain, computer monitor, continuous uniform distribution, cryptocurrency, cryptographic hash function, deviation (statistics), digital visual interface, elliptic curve digital signature algorithm, ethereum, fuzzing, github, hdmi, malware, massively multiplayer online role-playing game, probability distribution, random number generation, randomness, role-playing game, security hacker, smart contract, software bug, tempest (codename), virtual economy, wildstar (video game), world of warcraft
Tan Kean Siong
Security Researcher at Honeynet Project
backup, belief, bitcoin, computer file, computer security, credit card, cryptocurrency, cyberwarfare, desktop metaphor, directory (computing), domain name system, firefox, gps tracking unit, honeypot (computing), http 404, hypertext transfer protocol, icon (computing), mind, operating system, pdf, research, thought, user agent, web server, world wide web
Kelly Shortridge
VP of Product Strategy, at Capsule8
abstraction, access control, automation, behavioral game theory, belief, branches of science, business, calculus, chaos engineering, chaos theory, cloud computing, cognition, computer security, confidence, content delivery network, continuous delivery, continuous integration, conversation, design, devops, ecosystem, end user, experiment, fault tolerance, force, game theory, information security, interoperability, isaac newton, knowledge, landscape, learning, load balancing (computing), machine learning, map, mediation, memory, microservices, microsoft excel, mindset, noise, password, phishing, physics, prediction, progress, psychological resilience, question, rational choice theory, reality, reason, reliability engineering, school shooting, science, scientific method, screw, signal, software bug, spreadsheet, startup company, system, tax, technology, test automation, theory, truth, uncertainty, vulnerability (computing)
Nathaniel Quist
Senior Threat Researcher at Palo Alto Networks
amazon elastic compute cloud, authentication, best practice, cloud computing, cloud computing security, credential, cryptocurrency, database, education, encryption, firewall (computing), icloud, identity management, image scanner, kubernetes , login, multi-factor authentication, password, principle of least privilege, research, risk, rsa security, superuser, user (computing)
Ben Nassi
Ph.D. Student at Ben-Gurion University of the Negev
algorithm, ambient music, analog signal, camera, color, computer security, confidentiality, covid-19 pandemic, data compression, deep learning, depth perception, diaphragm (acoustics), distance, electric motor, encryption, equalization (audio), experiment, frequency, frequency domain, human eye, incandescent light bulb, information, internet, internet of things, laser, led lamp, lens, lidar, light, loudspeaker, machine learning, malware, metadata, microphone, microwave, network packet, optical flow, optical spectrometer, optics, outlier, perception, pixel, prediction, privacy, projector, radar, robust statistics, science, self-driving car, selfie, sensitivity and specificity, signal, siren (alarm), smartphone, sound, spectrum, speech recognition, stereoscopy, tesla, inc., time, traffic, truth, unmanned aerial vehicle, vibration, video, visual perception, wi-fi
Yisroel Mirsky
Postdoctoral Fellow at Georgia Institute of Technology
camera, color, computer security, deep learning, depth perception, internet, lidar, machine learning, optical flow, optics, outlier, perception, pixel, prediction, projector, robust statistics, science, self-driving car, stereoscopy, tesla, inc., traffic, truth, visual perception
Jen Trahan
COO at Sierra Club
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Wiktor Szymański
Director, Product Security at Discovery Inc
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Adam Meyers
SVP, Intelligence at CrowdStrike
antivirus software, application software, backup, bank fraud, belief, categorization, cheque fraud, crowdstrike, cryptolocker, data center, encryption, espionage, extortion, fraud, malware, microsoft exchange server, microsoft windows, motivation, national health service, ransomware, software , spamming, testimony, virtual machine, vulnerability (computing)
Kenneth Geers
Senior Research Scientist at Comodo Group
arms control, balance of payments, bitcoin, bitcoin network, blockchain, bretton woods system, cash, central intelligence agency, computer security, consensus (computer science), cryptocurrency, cyberwarfare, debugger, devaluation, digital currency, digital rights management, diplomacy, edward snowden, espionage, fixed exchange rate system, inflation, keystroke logging, legal tender, library, machine learning, malware, medium of exchange, mining pool, monero, monetary policy, monetization, money, national security, nato, north korea, one-time pad, option (finance), public-key cryptography, random number generation, risk, satoshi nakamoto, strategic depth, stuxnet, united states cyber command, wikileaks, zip (file format)
Brad Arkin
SVP at Cisco
active directory, advertising, android (operating system), application software, attention, authentication, certificate authority, cisco systems, cloud computing, computer network, dmz (computing), end user, internet, laptop, microsoft windows, mobile device, multi-factor authentication, onboarding, password, push technology, salesforce, tablet computer, telecommuting, virtual private network
Richard White
SVP at Flushing Bank
audit, bank, board of directors, computer security, consensus decision-making, curiosity, cybersecurity, decision-making, evidence, governance, information security, leadership, machine, pain, penetration test, policy, property, public utility, regulatory compliance, research, risk, risk assessment, strategic planning, team, truth, vulnerability (computing)
Susam Pal
Senior Architect at Walmart Labs
cloud computing, cloud computing security, computer data storage, computer programming, computer security, dashboard (business), database, elasticsearch, evaluation, facebook, file format, identity management, information security, input/output, interface (computing), ip address, json, mongodb, multi-cloud security monitoring, operating system, programming language, proprietary software, regulatory compliance, relational database, scheme (programming language), system
Chloe Messdaghi
Owner; Growth Strategy Consultant at Stand Out In Tech
anxiety, cortisol, covid-19 pandemic, crossword, cybersecurity, data, depression (mood), emotion, employment, experience, fatigue, frequent-flyer program, headache, health, heart, herpes labialis, hippocampus, hypertension, influenza, information, infosec, insight, long-term memory, loyalty program, major depressive disorder, memory, mind, muscle weakness, music, myocardial infarction, occupational burnout, pandemic, puzzle, risk, rsa, rsac, rsaconference, security, security hacker, sentence processing, short-term memory, simulation, sleep, spider, stress (biology), stroke, technical support, telecommuting, temporal lobe, twitter, visual memory, weakness, working memory, working time
Jabez Abraham
Senior Cyber Security Cloud Architect at Paige
amazon dynamodb, authentication, authorization, cloud computing, command-line interface, computer network, data validation, edge computing, end user, facebook, firewall (computing), function (mathematics), identity management, internet, internet of things, justice, kernel (operating system), product lifecycle, robot, search engine, server (computing), serverless computing, single sign-on, social norm, transport layer security
Chris Romeo
CEO at Security Journey
application security, attitude (psychology), azure devops server, cloud computing, computer programming, computer security, creativity, devops, empathy, faith, guard rail, i'm with you (album), mind, privacy, reason, return on investment, risk assessment, software bug, software framework, software testing, sql injection, threat model, understanding, value proposition
Adam Shostack
President at Shostack & Associates
accessibility, active listening, adobe photoshop, adversarial machine learning, advertising, agile software development, amazon (company), amazon web services, android (operating system), anxiety, appsec, appseccali, archaeology, attention, audit, authentication, behavior, belief, biometrics, blog, body language, brainstorming, buffer overflow, c++, categorization, closed-circuit television, cloud computing, cloud computing security, computer network, computer security, contract, conversation, credit, credit card, cross-site scripting, cryptocurrency, data security, database, denial-of-service attack, design, dialogue, empowerment, encryption, experiment, expert, facebook, facial recognition system, gamification, general data protection regulation, gesture, information privacy, internet, internet of things, internet privacy, knowledge, laboratory, law, learning, machine learning, microphone, microservices, microsoft visual studio, mobile app, multi-factor authentication, news, online chat, opera (web browser), outsourcing, owasp, password, patch (computing), payment card industry data security standard, pci-x, penetration test, peripheral component interconnect, playing card suit, point of sale, positive psychology, privacy, psychology, reason, regulatory compliance, reverse engineering, rsa conference, security, self-driving car, shopify, sms, software bug, software development, software framework, space, spades (card game), static program analysis, system, targeted advertising, test-driven development, theory, thread (computing), threat model, time, transport layer security, twitter, understanding, usability, use case, user experience design, user-centered design, version control, wireless security
Siddhesh Yawalkar
Director Of Engineering at Tala security
alexa internet, content security policy, credit card fraud, data exfiltration, exploit (computer security), google chrome, html5, hypertext transfer protocol, internet, internet privacy, internet security, javascript, malware, operating system, personal computer, proxy server, server (computing), solarwinds, vulnerability (computing), web analytics, web application, web browser, website, world wide web
Tom Bonner
Distinguished Threat Researcher at BlackBerry
16-bit computing, 32-bit computing, api, bit, booting, byte, compiler, computer file, core dump, covid, data, database, entropy, entry point, http cookie, itch, lighting, malware reverse engineering, memory, operating system, portable executable, reverse engineering, signature, sky, software bug, string (computer science)
Jess Garcia
Founder at One eSecurity
anomaly detection, artifact (archaeology), big data, computer, computer file, directory (computing), emerging technologies, file system, forensic science, intelligence, machine learning, memory, metadata, news, password, police, prediction, scheduling (computing), science, system, tablet computer, technology, thread (computing), wisdom
Glauco Sampaio
Information Security at Cielo
access control, civilization, computer security, credit card, database, database security, disease, email, memory, mining, password, patch (computing), privacy, risk, security hacker, server (computing), simulation, the abyss, time zone, uncertainty, user (computing), virtual private network, vulnerability (computing), water, white hat (computer security)
Andrea Little Limbago
VP at Interos Inc
arms industry, china–united states trade war, computer security, covid-19 pandemic, cyberwarfare, data security, e-democracy, european union, governance, great firewall, hong kong national security law, huawei, information privacy, internet, just-in-time manufacturing, manufacturing, national security, new world order (politics), privacy, psychological resilience, splinternet, supply chain attack, surveillance, united states
Mike Jankowski-Lorek
Director of Consulting at CQURE Inc.
api, application software, authentication, authorization, biometrics, certificate authority, client (computing), cloud computing, code signing, computer file, computer network, computer security, cybersecurity, data breach, data security, digital signature, dmz (computing), domain controller (windows), email, encryption, help desk, hypertext transfer protocol, information, infosec, internet, iris recognition, kodi (software), laptop, microsoft windows, modern identity hacking, multi-factor authentication, outlook.com, password, personal identification number, physical security, powershell, public key certificate, public key infrastructure, public-key cryptography, remote desktop services, rsa, rsac, rsaconference, security, server (computing), telecommuting, url redirection, user (computing), web browser, whatsapp, windows 10, world wide web
Kerry Matre
Sr. Director of Product and Services Marketing at FireEye
5 secops metrics, attention, automation, bit, book, business, covid-19 pandemic, firewall (computing), insurance, intelligence, investment, knowledge, language, learning, lottery, mindset, mission statement, next-generation firewall, research, resource, self-efficacy, shopping, truth, use case, utility
John Caimano
Global Practice Director at Palo Alto Networks
5 secops metrics, attention, automation, bit, book, business, covid-19 pandemic, firewall (computing), insurance, intelligence, investment, knowledge, language, learning, lottery, mindset, mission statement, next-generation firewall, research, resource, self-efficacy, shopping, truth, use case, utility
Jon-Michael C. Brook
Principal at Guide Holdings LLC
achilles, agamemnon, cloud computing, cloud computing security, cloud threat modeling, database, denial-of-service attack, design, educational technology, elasticsearch, encryption, greek mythology, home alone, kevin mccallister, marv (sin city), misuse case, privacy, risk, social engineering (security), software assurance, threat model, trojan horse, troy, vulnerability (computing)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21
1-30 of 617