Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 62
1-30 of 62
Filter
Manny Rivelo
CEO at Forcepoint
api, architecture, attack surface, blacklist (computing), business-to-business, cloud computing, computer security, cyberwarfare, data center, data exfiltration, digital transformation, email, forcepoint, hacker, learning, machine learning, malware, microsoft, ransomware, software framework, system, telecommuting, vulnerability (computing), whitelisting
Georgie Barrat
The Gadget Show Presenter at Channel 5
api, architecture, attack surface, blacklist (computing), business-to-business, cloud computing, computer security, cyberwarfare, data center, data exfiltration, digital transformation, email, forcepoint, hacker, learning, machine learning, malware, microsoft, ransomware, software framework, system, telecommuting, vulnerability (computing), whitelisting
John Strand
Owner at Black Hills Information Security
antivirus software, apple inc., authentication, authenticator, blacklist (computing), computer file, computer security, cybersecurity, directory (computing), information, information security, infosec, internet, keyboard technology, login, microsoft windows, multi-factor authentication, password, password strength, proxy server, red team, rsa, rsac, rsaconference, security, sms, threat intelligence, user (computing), vulnerability (computing), whitelisting, windows 10, world wide web
Emin Gun Sirer
Founder & CEO at Ava Labs
2021, aave, adam levy, alex skidanov, alon goren, amazon (company), api, arbitrage, art, auction, ava labs, ava-labs, avalanche, avax, bakers, bank, barbara liskov, bit, bitcoin, bitcoin network, bjorn wagner, blacklist (computing), blockchain, blockchain governance, blockchain interoperability, bloq, business, business ethics, cash, cash register, cd2020, central bank, cloud computing, coin, coindesk, coindesktv, communication, communication protocol, community, computer network, computer programming, computing, conference, consensus (computer science), consensus decision-making, contract, conversation, cornell, corporation, covenant (law), craig russo, crowdfunding, crypto, cryptocurrencies, cryptocurrency, cryptographic hash function, currency, data, database, decentralization, decentralized finance, default (finance), defi, democracy, design, diem (digital currency), digital asset, digital security, disability, distributed computing, double-spending, draper goren holm, draper venture network, economics, economy, eli ben-sasson, email, emergence, emin gun sirer, emin gün sirer, emin-gun-sirer, entrepreneurship, equal opportunity, ethereum, ethereum cross-chain, ethics, etoro, evan shapiro, event, facebook, finance, financial crisis, financial crisis of 2007–2008, fintech, food, game theory, global financial system, globalization, goal, god, goldman sachs, governance, hackathon, heterogeneous network, history, imagination, imovie, information, information privacy, infrastructure, initial coin offering, innovation, insight, insurance, interest, interest rate, internet, internet of things, internet protocol suite, interoperability, investor, it's-time-to-build, jeans, jihan wu, josef holm, kathleen breitman, kernel (operating system), kevin-werbach, kitchen, la blockchain summit, la blockchain week, language, latency (engineering), law, layer 1, leslie lamport, libra (digital currency), library, live, london, machine learning, macroeconomics, managing editor, marc andreessen, marc-andreesen, mark zuckerberg, market (economics), market liquidity, mathematics, matthew-roszak, mina, mina foundation, mind, mining pool, monetary policy, money, money laundering, moneydance, narrative, natural language processing, near protocol, news, non-interactive zero-knowledge proof, olaf carlson wee, ownership, panel, password, peer-to-peer, piers ridyard, polar bear, polkadot, polychain capital, polyient games, price, printer (computing), privacy, privacy and blockchain, private equity, productivity, programming language, progress, promise, proof of stake, proof of work, protocols, quantitative easing, radix, reality, reason, recession, regulatory compliance, rocket, scalability, scaling, security, sergey nazarov, server (computing), siri, skale, skale labs, smart contract, smart contracts, social contract, social media, society, space, speculation, sputnik 1, stablecoin, stan kladko, stani kulechov, starkware, startup company, status, steve jobs, summit, supply chain, supply chain management, swap (finance), system, tax, tech, technology, telecommunication, telephone, tezos, throughput, tim draper, time, token2049, trial and error, truth, tumblr, twitter, usability, use case, user interface, venmo, venture capital, virtual economy, virtual machine, visa inc., wall street, wealth, web3, welfare, wharton, world wide web, wrapped btc, yap, zack seward, zcash, zk
Devon Lawler
Senior Sales Engineer at Harness
apache kafka, api, blacklist (computing), cloud computing, containers, database, devops, docker, email, hypertext transfer protocol, instrumentation, kubernetes , library (computing), linux, macos, metadata, microservices, microsoft windows, post (http), server (computing), service-oriented architecture, sql, tag (metadata), telemetry, virtual machine, web service, whitelisting
Changpeng Zhao
CEO at Binance
academy awards, actor, adam levy, adoption, aesthetics, africa, al capone, aldi, alon goren, amazon alexa, android (operating system), anna irrera, anthony-pompliano, arcade game, art, aset kripto, asia, asset, attention, bailey-reutze, bailout, bank, behavior, big bang, binance, bitcoin, blacklist (computing), blockchain, bnb, bond (finance), bsc, business model, capital control, capital formation, car, cash, cd2020, cefi, cell (biology), central bank, ceo, changpeng zhao, changpeng-zhao, chief correspondent, chief executive officer, china, cogx2021, coin, coinbase, coindesktv, colorist, competition, concept, conference, conscience, contactless payment, contract, coronavirus disease 2019, covid-19, covid-19 pandemic, credibility, credit card, crypto, cryptocurrencies, cryptocurrency, cryptocurrency exchange, cuan, currency, cybercrime, cz, cz-stays-home, debit card, decentralization, decentralized finance, defi, definition, derivative (finance), digital currency, digital economy, digital security, doge, draper goren holm, draper venture network, economics, economy, economy of the united states, entrepreneurship, etherealsummit, etherealvirtual, ethereum, ethereum reuters, etoro, event, facial recognition system, fiat money, finance, financial crisis, financial market, financial technology, fintech, fireside chat, fireside chats, first-mover advantage, flag, flag of indonesia, food, founder, free trade, frédéric bastiat, future, futures contract, galaxy, ghetto, goal, hacker, hedge (finance), horizon, hotel, human, ibw, indonesia, indonesian language, inflation, interest, interest rate, internet, investment, ios, jersey, jesus, jointheconversation, josef holm, know your customer, kodak, kripto, la blockchain summit, la blockchain week, laura shin, lebanon, legal tender, leverage (finance), libra (digital currency), loan, logo, luck, machine, market (economics), market liquidity, market maker, mass-adoption, metamask, mind, mobile app, mobile phone, monetary policy, money, money laundering, moneyness, moon, morgan-creek, netflix, network effect, new jersey, news, nigeria, option (finance), password, payment, paypal, perception, pharmacy, physical therapy, pine, plantation, politics, price, privacy, proof of stake, property, quarantine, question, race (human categorization), radio, rebate (marketing), regulatory compliance, renminbi, satoshi nakamoto, security (finance), severe acute respiratory syndrome coronavirus 2, singapore, smart contract, social media, sonar, southeast asia, spamming, spotify, stablecoin, startup company, steam (service), stock, stock market, summit, super bowl, surgery, tax, telecommuting, telegram (software), terraria, the perfect storm (film), tim draper, time, tko, toko token, tokocrypto, too big to fail, tool, trade, trading, twitter, unemployment, united states, upload, usability, use case, user (computing), user experience, user interface, visa inc., wechat, whatsapp, wheel, xrp, youtube, zhaochangpeng
Joshua Brower
Senior Engineer at Security Onion Solutions, LLC
aqua (user interface), blacklist (computing), computer network, cron, cross-platform software, dashboard (business), database, desktop computer, file-system permissions, geodetic datum, google chrome, identifier, ip address, laptop, linux, localhost, metadata, phishing, ping (networking utility), security onion, security onion solutions, software release life cycle, software versioning, sql, sql syntax, syslog, user identifier
Scott Lane
Distinguished Engineer at Citrix
access control, analytics, android (operating system), blacklist (computing), bluetooth, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, email, enterprise, g suite, general data protection regulation, gmail, microsoft windows, mobile device management, mobility, multi-factor authentication, networking, phishing, proxy server, single sign-on, software , splunk, technology, telecommuting, virtual private network, virtualization, workspace, world wide web
George Kuruvilla
Strategist, Worldwide Presales at Citrix
access control, analytics, android (operating system), blacklist (computing), bluetooth, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, email, enterprise, g suite, general data protection regulation, gmail, microsoft windows, mobile device management, mobility, multi-factor authentication, networking, phishing, proxy server, single sign-on, software , splunk, technology, telecommuting, virtual private network, virtualization, workspace, world wide web
Bala Swaminathan
Sr. Manager - Product Development at Citrix
access control, analytics, blacklist (computing), browser isolation, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, command-line interface, computer network, content-control software, dynamic host configuration protocol, enterprise, facebook, http cookie, instagram, internet, malware, mobility, multi-factor authentication, networking, office 365, privacy, proxy server, single sign-on, social media, software , technology, url redirection, virtualization, web browser, website, world wide web
Praveen Raghuraman
Director, Product Management at Citrix
access control, analytics, android (operating system), apple inc., authenticator, blacklist (computing), browser isolation, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, command-line interface, computer network, content-control software, desktop virtualization, dynamic host configuration protocol, enterprise, facebook, firefox, google chrome, http cookie, information security, instagram, internet, internet explorer, ios, keystroke logging, malware, mobility, multi-factor authentication, networking, office 365, one-time password, password, privacy, proxy server, remote desktop protocol, rsa securid, single sign-on, social media, software , spamming, steam (service), technology, url redirection, virtualization, web browser, web portal, website, world wide web
Kees Baggerman
Technical Director, Engineering - End User Computing, Databases and G2K at Nutanix
blacklist (computing), business, chaos engineering, citrix synergy 2019, citrix systems, cloud, cloud computing, cloud storage, collaboration, computer cluster, computer data storage, computer hardware, database, desktop virtualization, distributed file system (microsoft), electrical grid, enterprise, hashtag, hypervisor, load balancing (computing), microsoft azure, microsoft windows, mobile app, mobility, networking, principle of least privilege, server message block, software , technology, troubleshooting, virtual machine, virtualization, wallpaper (computing), web portal, windows vista
Shane Kleinert
Solutions Architect, South East at Choice Solutions
blacklist (computing), business, chaos engineering, citrix synergy 2019, citrix systems, cloud, cloud computing, cloud storage, collaboration, computer cluster, computer data storage, computer hardware, database, desktop virtualization, distributed file system (microsoft), electrical grid, enterprise, hashtag, hypervisor, load balancing (computing), microsoft azure, microsoft windows, mobile app, mobility, networking, principle of least privilege, server message block, software , technology, troubleshooting, virtual machine, virtualization, wallpaper (computing), web portal, windows vista
Jarian Gibson
Sr Solutions Architect at Nutanix
blacklist (computing), business, chaos engineering, citrix synergy 2019, citrix systems, cloud, cloud computing, cloud storage, collaboration, computer cluster, computer data storage, computer hardware, database, desktop virtualization, distributed file system (microsoft), electrical grid, enterprise, hashtag, hypervisor, load balancing (computing), microsoft azure, microsoft windows, mobile app, mobility, networking, principle of least privilege, server message block, software , technology, troubleshooting, virtual machine, virtualization, wallpaper (computing), web portal, windows vista
Richard Achee
Global Technology Partner Lead - Chrome Enterprise at Google
#chromedevsummit, active directory, amazon alexa, analytics, android (operating system), android software development, application programming interface, application software, blacklist (computing), bluetooth, bring your own device, business, cds'19, cds19, chrome dev summit, chrome dev summit 19, chrome dev summit 2019, chrome developer summit, chrome developer summit 19, chrome developer summit 2019, chrome developers, chrome os, chromebook, citrix synergy 2019, citrix systems, citrix workspace, cloud, cloud computing, collaboration, command-line interface, computer virus, desktop computer, desktop virtualization, electronic health record, emergency medical technician, encryption, end user, enterprise, facebook, g suite, google, google chrome, google chrome dev summit 19, google chrome dev summit 2019, google chrome developers, google developers, google drive, google play, gos (operating system), health, health care, health professional, health system, hospital, interactive kiosk, ios, legacy system, malware, medical laboratory scientist, mhealth, microsoft windows, mobile app, mobile device, mobility, myspace, networking, next generation air transportation system, occupational burnout, operating system, password, patch (computing), patient, physician burnout, privacy, progressive web application, qr code, reliability engineering, single sign-on, software , software release life cycle, technology, virtualization, watson (computer), web application, web browser, wi-fi, windows update, workspace, world wide web
R N Tharu
Product Manager at Google
#chromedevsummit, active directory, android (operating system), android software development, api, application software, audit, blacklist (computing), business, cds'19, cds19, chrome dev summit, chrome dev summit 19, chrome dev summit 2019, chrome developer summit, chrome developer summit 19, chrome developer summit 2019, chrome developers, chrome os, chromebook, chromium (web browser), citrix synergy 2019, citrix systems, cloud, collaboration, computer virus, desktop virtualization, downtime, encryption, enterprise, g suite, google chrome, google chrome dev summit 19, google chrome dev summit 2019, google chrome developers, google developers, google play, gos (operating system), icon (computing), interactive kiosk, ios, javascript, legacy system, library (computing), linux, macintosh, macos, malware, microsoft windows, mobile app, mobility, networking, open-source software, operating system, patch (computing), single sign-on, software , software bug, software performance testing, software release life cycle, software testing, technology, virtualization, web browser, webkit, windows update, world wide web
Brian Byrne
Director of Engagement and Operations at EMVCo
ads, advertising, android (operating system), apple inc., apps, blacklist (computing), brand, business, conferences, contract, development, discord (software), education, email, facebook, google, google drive, growth, industry, influencer marketing, language, lectures, marketing, marketing management, markets, mgs, mobile, mobile app, mobile game, mobile growth summit, money, online advertising, payment, server (computing), skype, social media, software , streaming media, target audience, tech, technology
KJ Rocker
Director at KJ Rocker Fze
advertising, adwords, adwords advertising, affiliate conference, affiliate marketing, affiliate marketing conference, amazon affiliate, android (operating system), apple inc., blacklist (computing), buying facebook ads, celebrity, clickbank, dropshipping, ecommerce, email spam, facebook, facebook ads, facebook advertising, golf, golf course, google search, imagination, internet, istack, landing page, life expectancy, mathematical optimization, media buying, mind, mobile app, online marketing, pay-per-click, performance marketing, push technology, subscription business model, web browser, whatsapp
Ian Fernando
Digital Entrepreneur & Founder at IANternet Media
advertising, adwords, adwords advertising, affiliate conference, affiliate marketing, affiliate marketing conference, amazon affiliate, android (operating system), angle, apple inc., barcelona, blacklist (computing), buying facebook ads, celebrity, clickbank, coffee, concept, data, database, dropshipping, ecommerce, email spam, experience, facebook, facebook ads, facebook advertising, golf, golf course, google, google search, headline, icon (computing), imagination, insurance, internet, inventory, ios, istack, landing page, life expectancy, mathematical optimization, media buying, mind, mobile app, online marketing, pay-per-click, performance marketing, pixel, porch, push technology, subscription business model, sweepstake, trait theory, vampire, vehicle insurance, web browser, whatsapp, word
Anton Kornev
Founder & CEO at Xesturgy Media
advertising, adwords, adwords advertising, affiliate conference, affiliate marketing, affiliate marketing conference, amazon affiliate, android (operating system), angle, apple inc., barcelona, blacklist (computing), buying facebook ads, celebrity, clickbank, coffee, concept, data, database, dropshipping, ecommerce, email spam, experience, facebook, facebook ads, facebook advertising, golf, golf course, google, google search, headline, icon (computing), imagination, insurance, internet, inventory, ios, istack, landing page, life expectancy, mathematical optimization, media buying, mind, mobile app, online marketing, pay-per-click, performance marketing, pixel, porch, push technology, subscription business model, sweepstake, trait theory, vampire, vehicle insurance, web browser, whatsapp, word
Erik Gyepes
Founder & CEO at DEPI MEDIA FZE
advertising, adwords, adwords advertising, affiliate conference, affiliate marketing, affiliate marketing conference, amazon affiliate, android (operating system), apple inc., blacklist (computing), buying facebook ads, celebrity, clickbank, dropshipping, ecommerce, email spam, facebook, facebook ads, facebook advertising, golf, golf course, google search, imagination, internet, istack, landing page, life expectancy, mathematical optimization, media buying, mind, mobile app, online marketing, pay-per-click, performance marketing, push technology, subscription business model, web browser, whatsapp
Jameson Lopp
CTO at Casa
allen piscitello, automated teller machine, backup, backward compatibility, bandwidth (computing), bank, best practice, biometrics, bit, bitcoin, bitcoin 2022, bitcoin 2022 conference, bitcoin code, bitcoin core, bitcoin core developer, bitcoin development, bitcoin lightning, bitcoin network, bitcoin news today, bitcoin open source, bitcoin open source software, bitcoin price prediction, bitcoin trading, bitpay, blacklist (computing), blockchain, blockstream, brand, business, business-to-business, camera, casa, chainpoint, chargeback, clipboard (computing), communication protocol, community, computer, computer data storage, computer hardware, computer virus, computing, contract, covid-19 pandemic, creativity, credit, credit card, crypto coding, crypto news today, crypto software, crypto trading, cryptocurrency, cryptographic hash function, cryptography , currency, cut, copy, and paste, cypherpunk, data loss, database, distributed computing, dogecoin, double-spending, dropbox (service), eltoo, end user, escrow, ethereum, facebook, fingerprint, formal fallacy, game theory, google, google play, google play music, hacker, hacking, hard disk drive, hash function, hiv, horse, http cookie, image scanner, integer overflow, interest, internet, ios, jameson lopp, joao almeida, joão almeida, justice, know your customer, lansing, michigan, layer 2, lightning, lightning development, lightning network, login, lost bitcoin, malware, market liquidity, matt odell, matt odell bitcoin, matt odell citadel dispatch, meltdown (security vulnerability), michael tidwell, mind, mining pool, mobile phone, money, money laundering, mt. gox, multi-factor authentication, national security, network effect, news, number, online and offline, open source stage, open-source software, opennode, operating system, password, password manager, peer-to-peer, privacy, pseudonym, random number generation, ransomware, reality, reason, reckless, samsung, satoshi nakamoto, science, sd card, segwit, shame, sim swap, smart contract, social engineering, social engineering (security), software , space, streaming media, surveillance, swap (finance), tabconf, tax, tierion, transport layer security, twitter, uber, understanding, usability, usb, virus, wallet, watch towers, web browser
Steven Grubb
Security Architect at Red Hat
antivirus software, blacklist (computing), cache replacement policies, cd-rom, command-line interface, common criteria, computer virus, cryptographic hash function, database, dynamic linker, interpreter (computing), library (computing), linker (computing), malware, mandatory access control, patch (computing), php, ransomware, shell (computing), specification (technical standard), symbolic link, tag (metadata), world wide web, xml
Stéphane Graber
Engineering manager for LXD at Canonical Ltd.
android (operating system), backup, blacklist (computing), chrome os, chromebook, chroot, computer file, device file, file system, file-system permissions, http cookie, kernel (operating system), linux, linux distribution, linux security modules, namespace, network file system, password, pointer (computer programming), security-enhanced linux, snapchat, soundcloud, superuser, system call, ubuntu
Christian Brauner
Senior Engineer at Canonical Ltd
android (operating system), backup, blacklist (computing), chrome os, chromebook, chroot, computer file, device file, file system, file-system permissions, http cookie, kernel (operating system), linux, linux distribution, linux security modules, namespace, network file system, password, pointer (computer programming), security-enhanced linux, snapchat, soundcloud, superuser, system call, ubuntu
William Bengtson
Cloud Security Tools and Operations at Netflix
amazon dynamodb, amazon elastic compute cloud, amazon web services, api, appsec, appseccali, autoscaling, blacklist (computing), cloud computing, computer network, employee benefits, firebreak, gateway (telecommunications), hypertext transfer protocol, identifier, identity management, internet, internet protocol, intrusion detection system, ip address, ipv6, java (programming language), machine learning, metadata, network address translation, newline, owasp, pandora (console), php, pipeline (computing), power user, principle of least privilege, proxy server, security token, session id, single sign-on, software , software bug, software development kit, subnetwork, transport layer security, twitter, virtual private cloud, virtual private network, vulnerability (computing), web application, world wide web
Kyle Sheldon
TitleDirector, Cloud Security at Discover Financial Services
300 - advanced, amazon dynamodb, amazon elastic compute cloud, amazon web services, analytics, application software, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, blacklist (computing), cloud, cloud computing, cloud security, cloud security community, compliance, computer file, computer security, continuous integration, data protection, database, detective controls, devops, empowerment, file system, governance, guard rail, identity, incident response, infrastructure as code, infrastructure security, learning conference, metadata, microservices, ntfs, object storage, personal data, python (programming language), reliability engineering, risk, security, security best practices, security pioneers, sep311, session, wiki
Ryan Holland
Principal Technical Industry Specialist, AWS Security Services at AWS
200 - intermediate, access-control list, amazon web services, autoscaling, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, blacklist (computing), botnet, closed-circuit television, cloud, cloud computing, cloud security, cloud security community, command-line interface, communication protocol, compliance, computer security, data protection, denial-of-service attack, detective controls, fnd216, governance, https, hypertext transfer protocol, identity, incident response, infrastructure security, intelligence, internet, internet protocol, lambda calculus, learning conference, machine learning, network security, password, proofpoint, inc., reconnaissance, risk, ryan holland, security, security best practices, session, social networking service, subnetwork, the foundation, use case, vulnerability (computing)
Soumya Basu
PhD Student at Cornell University
abstraction, amazon elastic compute cloud, backup, bandwidth (computing), bitcoin, blacklist (computing), blockchain, communication protocol, computer network, consensus (computer science), credit card, internet protocol, ip address, jitter, latency (engineering), network congestion, node (networking), peer-to-peer, private network, router (computing), routing, scalability, server (computing), throughput, whitelisting
Philip James
Head Of Engineering at Trim
advertising, api, asheesh laroia, authentication, authenticator, blacklist (computing), client–server model, coding, computer security, credit card, cross-site request forgery, django (web framework), email, facebook, fediverse, gmail, google authenticator, google search, hashtag, have i been pwned?, instagram, internet, internet forum, internet relay chat, json, linux, login, man-in-the-middle attack, mastodon (software), microblogging, multi-factor authentication, oauth, password, philip james, phishing, point of sale, pycon, python, qr code, query string, scripting language, security token, single sign-on, slack (software), social media, social norm, streaming media, tutorial, twitter, web application, website, world wide web, yubikey
1 2 3
1-30 of 62