Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 357
Filter
Jen Trahan
COO at Sierra Club
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Wiktor Szymański
Director, Product Security at Discovery Inc
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Richard White
SVP at Flushing Bank
audit, bank, board of directors, computer security, consensus decision-making, curiosity, cybersecurity, decision-making, evidence, governance, information security, leadership, machine, pain, penetration test, policy, property, public utility, regulatory compliance, research, risk, risk assessment, strategic planning, team, truth, vulnerability (computing)
Susam Pal
Senior Architect at Walmart Labs
cloud computing, cloud computing security, computer data storage, computer programming, computer security, dashboard (business), database, elasticsearch, evaluation, facebook, file format, identity management, information security, input/output, interface (computing), ip address, json, mongodb, multi-cloud security monitoring, operating system, programming language, proprietary software, regulatory compliance, relational database, scheme (programming language), system
Rik Ferguson
VP at Trend micro
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Victoria Baines
Visiting Research Fellow at Oxford University
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Chris Blask
Executive Director - Marine Living Research Center at Unisys
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Jennifer Bisceglie
CEO at Interos Inc
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Tom Alrich
Co-leader at National Technology & Information Administration, US Dept. of Commerce
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Sounil Yu
CISO & Head of Research at JupiterOne
amazon web services, apple inc., blog, cia, cloud computing, cloud computing security, computer security, computing, database, facebook, hacker, icloud, immutable object, information security, malware, mobile app, network topology, privacy, random graph, robust statistics, secrecy, secure shell protocol, social media, twitter, veterinarian
Mary O’Brien
General Manager at IBM
asset, authentication, cloud computing, collaboration tool, community, computer network, computer security, customer, data breach, email, general data protection regulation, ibm, information privacy, information security, infrastructure, internet, organization, privacy, psychological resilience, regulatory compliance, reshaping security, risk, software framework, supply chain, telecommunication, value chain
Mauricio Guerra
Director Global Information Security at The Dow Chemical Company
asset, authentication, cloud computing, collaboration tool, community, computer network, computer security, customer, data breach, email, general data protection regulation, ibm, information privacy, information security, infrastructure, internet, organization, privacy, psychological resilience, regulatory compliance, reshaping security, risk, software framework, supply chain, telecommunication, value chain
Jimmy Sanders
Information Security - President at ISSA
community, computer security, cybersecurity, digital transformation, generation, global governance, goal, history, impact change, information security, knowledge, learning, mind, negotiation, netflix, organization, pandemic, pleasure, progress, psychological resilience, reason, risk, risk management, rsa security, security, superhero, technology
Angela Weinman
Head of Global Governance, Risk and Compliance at VMware
community, computer security, cybersecurity, digital transformation, generation, global governance, goal, history, impact change, information security, knowledge, learning, mind, negotiation, netflix, organization, pandemic, pleasure, progress, psychological resilience, reason, risk, risk management, rsa security, security, superhero, technology
Doug Merritt
CEO at Splunk
analytics, automation, best practice, big data, cloud computing, collaboration, computer security, cyberattack, cybercrime, cyberwarfare, database, information, information security, innovation, intelligence, machine learning, market (economics), news, rsa security, slack (software), splunk, supply chain, supply chain attack, technology, telecommuting
Mark Weatherford
CSO at AlertEnterprise and Chief Strategy Officer at National Cybersecurity Center
attorney's fee, big data, bill of materials, board of directors, brand, bug bounty program, by-law, child labour, ciso, class action, computer security, conflict of interest, database, derivative suit, discovery (law), enterprise software, equifax, federal trade commission, hospital, indemnity, information security, innovation, insider trading, internet, internet of things, medical device, misprision, non-disclosure agreement, onboarding, personal data, procurement, proof of concept, ransomware, reason, regulatory compliance, risk management, software bill of materials, solarwinds, stock, supply chain, supply chain attack, technology, transparency (behavior), u.s. securities and exchange commission, united states congress, use case, verizon communications, witness
Nick Jones
Senior Security Consultant at F-Secure Consulting
antivirus software, cloud computing, control plane, detection in the cloud, devops, entrepreneurship, evil eye, goal, ice, identity management, information security, infrastructure as code, law, mind, money, nothing, patch (computing), privacy, proxy server, reason, research, security, simulation, skype, technology, vulnerability (computing)
Alfie Champion
Senior Consultant & Global Attack Detection Lead at F-Secure Corporation
antivirus software, cloud computing, control plane, detection in the cloud, devops, entrepreneurship, evil eye, goal, ice, identity management, information security, infrastructure as code, law, mind, money, nothing, patch (computing), privacy, proxy server, reason, research, security, simulation, skype, technology, vulnerability (computing)
Cynthia Kaiser
Section Chief at FBI
automation, communication, computer security, conversation, cyberwarfare, deterrence theory, disinformation, election security, federal bureau of investigation, fusion center, information security, intelligence, internet, mind, misinformation, organization, perception, reality, reason, risk, sense, social media, social media measurement, understanding, united states department of homeland security, united states intelligence community
Geoff Hale
Director of the Election Security Initiative at DHS/CISA
advanced persistent threats, apt, apt attack, automation, belt and road initiative, cisco security, communication, computer security, conversation, counterintelligence, crowdstrike, cyberwarfare, deterrence theory, disinformation, ecological resilience, election audit, election security, facebook, fake news, federal bureau of investigation, fireeye, fireeye cyber defense summit 2019, fireeye cyber security, fortinet, fusion center, help america vote act, information security, infrastructure, intelligence, internet, malware detection, mind, misinformation, news, opinion poll, organization, palo alto networks, password, password manager, perception, phishing, reality, reason, risk, sense, situation awareness, social media, social media measurement, splunk, symantec, transparency (behavior), turnover (employment), twitter, understanding, united states department of homeland security, united states intelligence community, voter registration, voter-verified paper audit trail, zero day exploit, zero-day
Lester Godsey
Chief Information Security Officer at Maricopa County
automation, communication, computer security, conversation, cyberwarfare, deterrence theory, disinformation, election security, federal bureau of investigation, fusion center, information security, intelligence, internet, mind, misinformation, organization, perception, reality, reason, risk, sense, social media, social media measurement, understanding, united states department of homeland security, united states intelligence community
Bryson Bort
CEO and Founder at SCYTHE
automation, communication, computer security, conversation, cyberwarfare, deterrence theory, disinformation, election security, federal bureau of investigation, fusion center, information security, intelligence, internet, mind, misinformation, organization, perception, reality, reason, risk, sense, social media, social media measurement, understanding, united states department of homeland security, united states intelligence community
Aaron Charfoos
Partner at Paul Hastings
breach of contract, class action, computer security, confidentiality, consent, contract, cyber, data breach, data protection act 1998, deposition (law), federal government of the united states, financial crimes enforcement network, general data protection regulation, health insurance portability and accountability act, information privacy, information security, iso/iec 27001, lawsuit, managing privacy, personal data, personal information protection and electronic documents act, privacy, protected health information, ransomware, right to privacy, self-report study, sexual consent
Ericka Johnson
Associate at Squire Patton Boggs
breach of contract, class action, computer security, confidentiality, consent, contract, cyber, data breach, data protection act 1998, deposition (law), federal government of the united states, financial crimes enforcement network, general data protection regulation, health insurance portability and accountability act, information privacy, information security, iso/iec 27001, lawsuit, managing privacy, personal data, personal information protection and electronic documents act, privacy, protected health information, ransomware, right to privacy, self-report study, sexual consent
Don Murdoch
Senior Security Engineer at Blue Cross Blue Shield Association
active directory, adversary simulation, antivirus software, api, application security, architect, audit, automation, communication protocol, computer mouse, computer network, computer security, cron, cryptographic hash function, cyberwarfare, gaps , gateway (telecommunications), gigabyte, h.323, information security, internet protocol, ip address, learning, md5, network address translation, open-source-software movement, outsourcing, parsing, pcap, powershell, proxy server, red team, regulatory compliance, research, robotics, security onion, security onion solutions, security posture, simulation, sql injection, swot analysis, system, thought, transmission control protocol, understanding, use case, utility, voice over ip, vulnerability (computing), web service, world wide web
Adi Shamir
Borman Professor of Computer Science at The Weizmann Institute
amazon web services, apple inc., application software, artificial neural network, authentication, blockchain, bluetooth, computing, covid-19 pandemic, cryptanalysis, cryptograph, cryptography , cybersecurity, database, differential privacy, diffie–hellman key exchange, economics, ethics, expectation of privacy, facial recognition system, general data protection regulation, immunity passport, information, information security, infosec, intel, key exchange, machine learning, monopoly, multi-factor authentication, password, post-quantum cryptography, precedent, prepaid mobile phone, privacy, psychological resilience, qr code, quantum computing, quantum supremacy, recidivism, right to be forgotten, rsa, rsa (cryptosystem), rsac, rsaconference, security, security hacker, sim card, sms, supply chain, supply chain attack, voter-verified paper audit trail, web search engine
Ronald Rivest
Professor at MIT Department of Electrical Engineering and Computer Science
academy, advanced encryption standard, amazon web services, anubis (cipher), apple inc., application software, applied crypto & blockchain, artificial neural network, authentication, belgium, block cipher, blockchain, bluetooth, book, business perspectives, cipher, computing, covid-19 pandemic, cryptanalysis, cryptograph, cryptographic hash function, cryptography , cybersecurity, database, differential privacy, diffie–hellman key exchange, digital signature, doctorate, economics, encryption, ethics, expectation of privacy, facial recognition system, fellow, general data protection regulation, immunity passport, information, information security, information theory, infosec, intel, key (cryptography), key exchange, leuven, luck, machine learning, mathematics, medical privacy, microcode, monopoly, multi-factor authentication, national institute of standards and technology, netherlands, password, post-quantum cryptography, precedent, prepaid mobile phone, privacy, professor, programming language, proof of work, protecting data & the supply chain ecosystem, psychological resilience, public-key cryptography, qr code, quantum computing, quantum supremacy, reason, recidivism, research, right to be forgotten, ron rivest, rsa, rsa (cryptosystem), rsac, rsaconference, secret sharing, secure multi-party computation, security, security hacker, sim card, sms, supply chain, supply chain attack, surveillance, symmetric-key algorithm, transport layer security, trust (social science), united states, verifiable secret sharing, voter-verified paper audit trail, web search engine, whirlpool (hash function), wikipedia
Whitfield Diffie
Cryptographer and Security Expert at Cryptomathic
amazon web services, apple inc., application software, artificial neural network, authentication, blockchain, bluetooth, computing, covid-19 pandemic, cryptanalysis, cryptograph, cryptography , cybersecurity, database, differential privacy, diffie–hellman key exchange, digital signature, economics, ethics, expectation of privacy, facial recognition system, general data protection regulation, immunity passport, information, information security, information theory, infosec, intel, key (cryptography), key exchange, machine learning, medical privacy, microcode, monopoly, multi-factor authentication, password, post-quantum cryptography, precedent, prepaid mobile phone, privacy, programming language, proof of work, psychological resilience, public-key cryptography, qr code, quantum computing, quantum supremacy, reason, recidivism, right to be forgotten, ron rivest, rsa, rsa (cryptosystem), rsac, rsaconference, secret sharing, secure multi-party computation, security, security hacker, sim card, sms, supply chain, supply chain attack, surveillance, transport layer security, trust (social science), verifiable secret sharing, voter-verified paper audit trail, web search engine
Zulfikar Ramzan
Chief Technology Officer at RSA
ai in finance, amazon web services, analytics, ananth madhavan, antivirus software, apple inc., application software, artificial neural network, authentication, automation, bank, bitcoin, blackrock, blockchain, bloomberg, bluetooth, certificate authority, christina qi, cluster analysis, computer security, computer virus, computing, configuration management database, consumer price index, covid-19 pandemic, credit card, cryptanalysis, cryptograph, cryptography , cybersecurity, database, day trading, differential privacy, diffie–hellman key exchange, digital identity, digital privacy, digital signature, domeyard fund, economics, elon musk, encryption, end user, ethics, exchange-traded fund, expectation of privacy, facebook, facial recognition system, federated identity, financial technology, flash boys, general data protection regulation, governance, identity assurance, identity management, immunity passport, index fund, information, information security, information theory, infosec, intel, internet of things, keith rabois, key (cryptography), key exchange, khosla ventures, liberty alliance, machine learning, malware, market (economics), market analysis, martin hellman, medical privacy, microcode, microsoft account, mit, mit ai conference, mitcnc, monopoly, multi-factor authentication, natural language processing, online shopping, password, peer-to-peer, post-quantum cryptography, precedent, prepaid mobile phone, price index, privacy, programming language, proof of work, psychological resilience, public key infrastructure, public-key cryptography, qr code, quantitative analysis (finance), quantum computing, quantum supremacy, ransomware, reason, recidivism, regulatory compliance, right to be forgotten, risk management, ron rivest, rsa, rsa (cryptosystem), rsac, rsaconference, secret sharing, secure multi-party computation, security, security hacker, security token, selina wang, sim card, sms, supervised learning, supply chain, supply chain attack, surveillance, telecommuting, trading room, transport layer security, trust (social science), underwriting, unsupervised learning, usability, venture capital, verifiable secret sharing, voter-verified paper audit trail, vulnerability (computing), web search engine, whitfield diffie, workforce, zulfikar ramzan
Ross Anderson
Professor of Security Engineering at University of Cambridge
amazon web services, apple inc., application software, artificial neural network, blockchain, bluetooth, computing, covid-19 pandemic, cryptograph, cryptography , database, economics, ethics, immunity passport, information security, intel, machine learning, monopoly, psychological resilience, qr code, quantum computing, quantum supremacy, security hacker, supply chain, supply chain attack
1 2 3 4 5 6 7 8 9 10 11 12