Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 367
1-30 of 367
Filter
Hemant Malik
Principal Solutions Architect, Cloud Partners at Elastic
add the power of search to your microsoft azure environment | od503, adrienne cohen, analytics, anomaly detection, azure, azure: analytics, azure: developer tools, azure: devops, build, c1x9, categorization, cloud computing, elasticsearch, equation, hemant malik, information, information security, insight, internet, jaime easter, jennifer garcia, john knoepfle, knowledge worker, kubernetes , learning, machine learning, malware, mathematics, microservices, microsoft, microsoft azure, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, od503, on-demand, organization, password, pdf, reliability engineering, telemetry
Jonh Knoepfle
Principal Solutions Architect at Elastic
add the power of search to your microsoft azure environment | od503, adrienne cohen, analytics, anomaly detection, azure, azure: analytics, azure: developer tools, azure: devops, build, c1x9, categorization, cloud computing, elasticsearch, equation, hemant malik, information, information security, insight, internet, jaime easter, jennifer garcia, john knoepfle, knowledge worker, kubernetes , learning, machine learning, malware, mathematics, microservices, microsoft, microsoft azure, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, od503, on-demand, organization, password, pdf, reliability engineering, telemetry
Jeremy Tasker
Head of Financial Sponsors and Private Equity at Macquarie Capital
algorithm, analytics, bank, china, commodity, credit, credit risk, data, debit card, digital economy, digital enterprise, direct debit, economy, illion, information, information asymmetry, information security, insurance, macquarie, macquarie capital, macquarie group, macquarie technology summit, market (economics), open banking, open data, predictive analytics, price, pricing, privacy, risk, security, simon bligh, technology, telecommunication
Simon Bligh
CEO at illion
algorithm, analytics, bank, china, commodity, credit, credit risk, data, debit card, digital economy, digital enterprise, direct debit, economy, illion, information, information asymmetry, information security, insurance, macquarie, macquarie capital, macquarie group, macquarie technology summit, market (economics), open banking, open data, predictive analytics, price, pricing, privacy, risk, security, simon bligh, technology, telecommunication
Behnam Dayanim
partner, chair of Advertising, Gaming & Promotions and co-chair of Privacy & Cybersecurity practices at Paul Hastings LLP
accountability, algorithm, attorney general, best practice, bias, bill (law), california, california consumer privacy act, class action, computer security, consent, consumer price index, consumer privacy, crime, cyberattack, cybersecurity, data, data breach, data security, discovery (law), donald trump, ethics, european union, evaluation, federal government of the united states, future, general data protection regulation, health care, health informatics, health insurance portability and accountability act, information, information privacy, information security, infosec, intelligence, internet privacy, justice, law, law firm, lawyer, learning, machine learning, market (economics), mathematics, mind, nevada, personal data, privacy, privacy law, protected health information, ransomware, regulation, research, rice, rights, rsa, rsa (cryptosystem), rsac, rsaconference, security, self, state law (united states), tax, technology, telecommuting, time, torah, transparency (behavior), united states, well-being, wine
Jennifer Czaplewski
Director of the Product Security at Target
api, application security, best practice, communication, computer security, cross-site scripting, cybersecurity, devops, information, information security, infosec, inventory, knowledge, mobile app, net promoter, penetration test, point of sale, risk, rsa, rsac, rsaconference, security, security hacker, shipt, sql injection, system, target corporation, understanding, vulnerability (computing), web development, world wide web
John Pescatore
Director at SANS
analytics, blockchain, cybersecurity, deep blue (chess computer), deep learning, expert, expert system, information, information security, infosec, internet security, intrusion detection system, machine learning, malware, mind, patch (computing), problem solving, programming language, ransomware, rsa, rsac, rsaconference, search engine, security, signal, siri, software , supervised learning, syslog, vulnerability (computing)
Eugene Istrati
Chief Technology Officer at Mitoc Group
active directory, amazon web services, automation, aws, cloud, cloud conference, computer file, database, demo, direct connect (protocol), directory (computing), domain name system, fault (geology), gas, github, information security, internet, live demo, map, microsoft, mobile phone, modular programming, module, open source, open-source software, peering, reason, self-service, shared services, single sign-on, siri, six feet up, sixfeetup, terraform, version control, virtual, virtual conference
David Poindexter
Cloud Architect & Executive Advisor at CleanSlate
amazon elastic compute cloud, amazon web services, aws, bluetooth, capacitor, cloud, cloud computing, communication, control flow, dashboard (business), email, embedded system, federated identity, google workspace, hardware, information security, internet of things, iot, javascript, light-emitting diode, login, push technology, reason, security, six feet up, sixfeetup, sms, splunk, technology, twilio, world wide web, zoom (software)
Vandana Verma
Security Architect at IBM India Software Labs
app migration, appsec, asynchronous, audit, authentication, authorization, automation, belief, caching patterns, cgroups, christian louboutin, cloud computing, cloud computing security, cloud sidecar, clusters gitops, computer data storage, computer network, computer security, creativity, cybercrime, data lakes, distributed database, encryption, endpoint security, fintech, flagger , fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, gender, general data protection regulation, god, graalvm, graviton2, hacker, hdfs, health check, iam reliability, ibm cloud computing, ibm india, identity management, information security, infrastructure drift, internet of things, jumpstart, justice, kerala, key (cryptography), key management, kotlin, kubernetes , kubernetes cloud, life-cycle assessment, mentorship, microservice, millennials, mind, multi-cloud magic, multi-factor authentication, need for speed, opa, open liberty, open-source intelligence, operating system, owasp, pipelines ci/cd, poilcy-as-code, product lifecycle, psychology, public cloud, quarkus, risk management, security hacker, server (computing), serverless, single sign-on, social engineering (security), social exclusion, social media, space, telemetry, thought, transgender, understanding
Jen Trahan
COO at Sierra Club
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Wiktor Szymański
Director, Product Security at Discovery Inc
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Richard White
SVP at Flushing Bank
audit, bank, board of directors, computer security, consensus decision-making, curiosity, cybersecurity, decision-making, evidence, governance, information security, leadership, machine, pain, penetration test, policy, property, public utility, regulatory compliance, research, risk, risk assessment, strategic planning, team, truth, vulnerability (computing)
Susam Pal
Senior Architect at Walmart Labs
cloud computing, cloud computing security, computer data storage, computer programming, computer security, dashboard (business), database, elasticsearch, evaluation, facebook, file format, identity management, information security, input/output, interface (computing), ip address, json, mongodb, multi-cloud security monitoring, operating system, programming language, proprietary software, regulatory compliance, relational database, scheme (programming language), system
Rik Ferguson
VP at Trend micro
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Victoria Baines
Visiting Research Fellow at Oxford University
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Chris Blask
Executive Director - Marine Living Research Center at Unisys
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Jennifer Bisceglie
CEO at Interos Inc
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Tom Alrich
Co-leader at National Technology & Information Administration, US Dept. of Commerce
big data, bill of materials, brand, child labour, computer security, enterprise software, hospital, information security, innovation, internet, internet of things, medical device, onboarding, procurement, proof of concept, reason, regulatory compliance, risk management, software bill of materials, solarwinds, supply chain, technology, transparency (behavior), use case
Sounil Yu
CISO & Head of Research at JupiterOne
amazon web services, apple inc., blog, cia, cloud computing, cloud computing security, computer security, computing, database, facebook, hacker, icloud, immutable object, information security, malware, mobile app, network topology, privacy, random graph, robust statistics, secrecy, secure shell protocol, social media, twitter, veterinarian
Mary O’Brien
General Manager at IBM
asset, authentication, cloud computing, collaboration tool, community, computer network, computer security, customer, data breach, email, general data protection regulation, ibm, information privacy, information security, infrastructure, internet, organization, privacy, psychological resilience, regulatory compliance, reshaping security, risk, software framework, supply chain, telecommunication, value chain
Mauricio Guerra
Director Global Information Security at The Dow Chemical Company
asset, authentication, cloud computing, collaboration tool, community, computer network, computer security, customer, data breach, email, general data protection regulation, ibm, information privacy, information security, infrastructure, internet, organization, privacy, psychological resilience, regulatory compliance, reshaping security, risk, software framework, supply chain, telecommunication, value chain
Jimmy Sanders
Information Security - President at ISSA
community, computer security, cybersecurity, digital transformation, generation, global governance, goal, history, impact change, information security, knowledge, learning, mind, negotiation, netflix, organization, pandemic, pleasure, progress, psychological resilience, reason, risk, risk management, rsa security, security, superhero, technology
Angela Weinman
Head of Global Governance, Risk and Compliance at VMware
community, computer security, cybersecurity, digital transformation, generation, global governance, goal, history, impact change, information security, knowledge, learning, mind, negotiation, netflix, organization, pandemic, pleasure, progress, psychological resilience, reason, risk, risk management, rsa security, security, superhero, technology
Doug Merritt
CEO at Splunk
analytics, automation, best practice, big data, cloud computing, collaboration, computer security, cyberattack, cybercrime, cyberwarfare, database, information, information security, innovation, intelligence, machine learning, market (economics), news, rsa security, slack (software), splunk, supply chain, supply chain attack, technology, telecommuting
Mark Weatherford
CSO at AlertEnterprise and Chief Strategy Officer at National Cybersecurity Center
attorney's fee, big data, bill of materials, board of directors, brand, bug bounty program, by-law, child labour, ciso, class action, computer security, conflict of interest, database, derivative suit, discovery (law), enterprise software, equifax, federal trade commission, hospital, indemnity, information security, innovation, insider trading, internet, internet of things, medical device, misprision, non-disclosure agreement, onboarding, personal data, procurement, proof of concept, ransomware, reason, regulatory compliance, risk management, software bill of materials, solarwinds, stock, supply chain, supply chain attack, technology, transparency (behavior), u.s. securities and exchange commission, united states congress, use case, verizon communications, witness
Nick Jones
Senior Security Consultant at F-Secure Consulting
antivirus software, cloud computing, control plane, detection in the cloud, devops, entrepreneurship, evil eye, goal, ice, identity management, information security, infrastructure as code, law, mind, money, nothing, patch (computing), privacy, proxy server, reason, research, security, simulation, skype, technology, vulnerability (computing)
Alfie Champion
Senior Consultant & Global Attack Detection Lead at F-Secure Corporation
antivirus software, cloud computing, control plane, detection in the cloud, devops, entrepreneurship, evil eye, goal, ice, identity management, information security, infrastructure as code, law, mind, money, nothing, patch (computing), privacy, proxy server, reason, research, security, simulation, skype, technology, vulnerability (computing)
Cynthia Kaiser
Section Chief at FBI
automation, communication, computer security, conversation, cyberwarfare, deterrence theory, disinformation, election security, federal bureau of investigation, fusion center, information security, intelligence, internet, mind, misinformation, organization, perception, reality, reason, risk, sense, social media, social media measurement, understanding, united states department of homeland security, united states intelligence community
Geoff Hale
Director of the Election Security Initiative at DHS/CISA
advanced persistent threats, apt, apt attack, automation, belt and road initiative, cisco security, communication, computer security, conversation, counterintelligence, crowdstrike, cyberwarfare, deterrence theory, disinformation, ecological resilience, election audit, election security, facebook, fake news, federal bureau of investigation, fireeye, fireeye cyber defense summit 2019, fireeye cyber security, fortinet, fusion center, help america vote act, information security, infrastructure, intelligence, internet, malware detection, mind, misinformation, news, opinion poll, organization, palo alto networks, password, password manager, perception, phishing, reality, reason, risk, sense, situation awareness, social media, social media measurement, splunk, symantec, transparency (behavior), turnover (employment), twitter, understanding, united states department of homeland security, united states intelligence community, voter registration, voter-verified paper audit trail, zero day exploit, zero-day
1 2 3 4 5 6 7 8 9 10 11 12 13
1-30 of 367