Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 101
1-30 of 101
Filter
Keshav Jain
Technology Security Associate Manager at Accenture
active directory, agent-based model, algorithm, amazon (company), analytics, automation, behavioral analytics, booting, cloud computing, cloud computing security, computer security, cyberattack, cyberwarfare, data center, engineer, incident management, intelligence, internet, intrusion detection system, machine learning, management, microsoft, microsoft 365, microsoft azure, microsoft windows, office 365, on-premises software, palo alto networks, security alarm, security information and event management, sms, software , sql, system, system on a chip, telemetry, threat intelligence, twitter, vulnerability (computing), web application, web application firewall, workspace
Michael Mylrea
Senior Director of Cybersecurity R&D (ICS, IoT, IIoT) at GE Global Research
automation, big data, computer security, cyber-physical system, cyberattack, cybersecurity, cyberwarfare, digital twin, distributed generation, energy development, information, infosec, infrastructure, internet of things, intrusion detection system, machine learning, operational technology, perception, power station, rsa, rsac, rsaconference, security, social engineering (security), stuxnet, telecommuting, transport, transport network analysis, trust (social science), unmanned aerial vehicle, zero-day (computing)
John Pescatore
Director at SANS
analytics, blockchain, cybersecurity, deep blue (chess computer), deep learning, expert, expert system, information, information security, infosec, internet security, intrusion detection system, machine learning, malware, mind, patch (computing), problem solving, programming language, ransomware, rsa, rsac, rsaconference, search engine, security, signal, siri, software , supervised learning, syslog, vulnerability (computing)
Steve Lodin
Senior Director, Cyber Security Operations at Salle Mae
active directory, amazon (company), amazon elastic compute cloud, amazon web services, bank, business continuity planning, cloud, cloud conference, data center, devops, encryption, financial technology, firewall (computing), governance, infrastructure as code, intrusion detection system, linux, loyalty program, navient, operating system, patch (computing), principle of least privilege, private student loan (united states), procurement, sallie mae, serverless computing, six feet up, sixfeetup, virtual, virtual conference, virtual machine
Jen Trahan
COO at Sierra Club
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Wiktor Szymański
Director, Product Security at Discovery Inc
business, case study, cloud computing, construction, continuous integration, facebook, firmware, identity management, information security, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, product lifecycle, recruitment, systems development life cycle, team, technical support
Shawn Bass
CTO at VMware
analytics, android (operating system), authentication, bring your own device, cloud computing, computer network, data center, disk encryption, end user, end-to-end principle, endpoint security, identity management, intrinsic security, intrusion detection system, malware, microservices, multi-factor authentication, operating system, patch (computing), regulatory compliance, single sign-on, telecommuting, troubleshooting, virtual private network, vulnerability (computing), web application
Pere Monclus
VP & CTO Network and Security BU at VMware
analytics, android (operating system), authentication, automation, bring your own device, cloud computing, computer network, computer vision, data center, database, deployment environment, design, devops, disk encryption, encryption, end user, end-to-end principle, endpoint security, google app engine, identity management, innovation, intrinsic security, intrusion detection system, kubernetes , machine learning, malware, microservices, mobile app, multi-factor authentication, open-source software, operating system, patch (computing), point of sale, real-time computing, regulatory compliance, salesforce, sense, single sign-on, tablet computer, telecommuting, transport layer security, troubleshooting, virtual private network, vulnerability (computing), web application
Cindy Blake
Product Marketing Manager at GitLab
access control, authentication, backdoor (computing), cloud computing, computer network, computer security, data center, devops, digital signature, fuzzing, image scanner, infrastructure as code, intrusion detection system, kubernetes , library (computing), malware, microservices, package manager, patch (computing), penetration test, product lifecycle, security-as-code, software development, traceability, version control, vulnerability (computing)
Lenny Zeltser
Instructor / VP of Products at Minerva Labs & SANS
antivirus software, api, blacklist (computing), botnet, brute-force attack, command-line interface, computer file, computer virus, cryptographic hash function, cryptography , database, debugging, digital signature, disassembler, domain name system, dynamic-link library, encryption, file format, google search, handle (computing), hard coding, hyper-v, intelligence analysis, intrusion detection system, linux, linux distribution, malware, malware on linux, md5, microsoft windows, ransomware, shared resource, string (computer science), transmission control protocol, url redirection, user agent, virtual appliance, virtualbox, virtualization, virustotal, vmware, vulnerability (computing), windows 10, windows registry, wireshark, world wide web
Brian Robertson
Expert in Product Messaging at RSA
accuracy and precision, antivirus software, artifact (archaeology), automation, behavior, computer security, decision-making, effective orchestration, email, future, insight, intelligence, intelligence analysis, intrusion detection system, kinect, learning, machine learning, nature, proxy server, robot, sim card, standardization, system, threat intelligence
Megan Horner
Senior Product Marketing Manager at COFENSE
accuracy and precision, antivirus software, artifact (archaeology), automation, behavior, computer security, decision-making, effective orchestration, email, future, insight, intelligence, intelligence analysis, intrusion detection system, kinect, learning, machine learning, nature, proxy server, robot, sim card, standardization, system, threat intelligence
Mei Nelson
Security Principal at Mei Nelson Accenture Security
brand, computer science, computer security, cyberattack, cybercrime, cybersecurity, cyberwarfare, decision-making, geopolitics, information, infosec, intelligence analysis, intrusion detection system, kill chain, law, news, policy, proactive cyber defence, reason, risk, risk management, rsa, rsac, rsaconference, sabotage, security, strategy, threat intelligence, understanding, vulnerability (computing), world war ii, writer
Joseph Carson
Chief Security Scientist (CSS) & Advisory CISO at Thycotic
access control, bring your own device, cloud computing, computer network, computer security, cybercrime, cybersecurity, database, firewall (computing), gateway (telecommunications), industrial internet of things, information, infosec, internet, internet of things, intrusion detection system, network security, password, penetration test, personal computer, phishing, piracy, rsa, rsac, rsaconference, security, server (computing), social engineering (security), social media, user (computing), vulnerability (computing), world wide web
Brujo Benavides
Staff Engineer at NextRoll
30 rock, 3d printing, acura, airline, amelia island, android (operating system), anomaly detection, anonymous function, apple inc., application software, aquarium, aurora (disney), ballistics, barometer, behavior, binary file, bit, blog, boolean data type, brown dwarf, california, callback (computer programming), canada, cell site, central processing unit, cisco systems, classical element, classical guitar, code, colombia, color, command-line interface, communication, compiler, computer, computer data storage, computer hardware, computer network, computer programming, computing, confidentiality, covid-19 pandemic, cut, copy, and paste, database, dell, dental braces, directory (computing), dog, ebay, elijah, elmo, elvis presley, email, emoji, employment, encapsulation (computer programming), error, espn, feedback, feeling, floating-point arithmetic, food, function (mathematics), functional programming, glasses, google, gradient descent, graphics processing unit, guitar, hippie, hispanic and latino americans, http cookie, information, information retrieval, interface (computing), internet, internet of things, interview, intrusion detection system, ios, java (programming language), knowledge, language, lawyer, learning curve, lease, library, library (computing), list comprehension, logic, love, luck, machine, machine learning, magic (supernatural), makefile, mars, mars landing, mathematical optimization, mathematics, meme, memory, metadata, metallica, method (computer programming), mobile app, modular programming, mother, motivation, music, navigation, neural network, news, nothing, nvidia, observation, open source, open-source-software movement, oregon, paragraph, parameter (computer programming), perception, perseverance (rover), philadelphia, philippines, playstation, playstation vita, price, property, random-access memory, raspberry pi, real-time computing, reason, recursion, recursion (computer science), reddit, reliability engineering, research, return statement, rock music, ruby (programming language), runtime system, samsung galaxy s4, satellite, sauce, semicolon, server (computing), sibling, siri, software , source code, source lines of code, space, spain, spanish language, speech synthesis, statistics, string (computer science), stroke, stylus, subroutine, text messaging, the home depot, the runaways (2010 film), time, timer, truth, twitter, type system, united states, vector processor, version control, video card, visual basic, wind, youtube
Domino Valdano
Staff Software Engineer at VMware
analytics, association rule learning, center of mass, centroid, cluster analysis, correlation and dependence, dbscan, deep learning, dependent and independent variables, function (mathematics), geographic information system, histogram, image segmentation, intrusion detection system, k-means clustering, machine learning, market segmentation, neural networks, online analytical processing, science, statistical classification, tax, unsupervised learning
Reinhard Keil
Sr Director of Embedded Tools at Arm
api, arm cortex-m, cloud computing, computer data storage, computer network, device driver, documentation, embedded system, google chrome, icloud, internet of things, intrusion detection system, linux, microsoft windows, mobile app, operating system, product lifecycle, program optimization, project management, software , web portal, wi-fi, windows xp, world wide web, xml
Razia Khan
Chief Economist and Head of Research at Standard Chartered Bank
amazon (company), amazon web services, analytics, chief risk officer, corporates, cryptocurrency, cybersecurity, data center, database, database transaction, derivative (finance), disaster recovery, enterprise risk management, great depression, innovation, intrusion detection system, learning analytics, machine learning, money laundering, risk management, scalability, software , startup company, strategic management, sustainability, telecommuting
Helen Hunter-Jones
Pay.UK at Chief Risk Officer
amazon (company), amazon web services, analytics, chief risk officer, corporates, cryptocurrency, cybersecurity, data center, database, database transaction, derivative (finance), disaster recovery, enterprise risk management, great depression, innovation, intrusion detection system, learning analytics, machine learning, money laundering, risk management, scalability, software , startup company, strategic management, sustainability, telecommuting
Deborah Hrvatin
Chief Risk Office at CLS Group
amazon (company), amazon web services, analytics, chief risk officer, corporates, cryptocurrency, cybersecurity, data center, database, database transaction, derivative (finance), disaster recovery, enterprise risk management, great depression, innovation, intrusion detection system, learning analytics, machine learning, money laundering, risk management, scalability, software , startup company, strategic management, sustainability, telecommuting
Anastasia Raissis
Director at AWS
amazon (company), amazon web services, analytics, chief risk officer, corporates, cryptocurrency, cybersecurity, data center, database, database transaction, derivative (finance), disaster recovery, enterprise risk management, great depression, innovation, intrusion detection system, learning analytics, machine learning, money laundering, risk management, scalability, software , startup company, strategic management, sustainability, telecommuting
Shalini Warrier
Chief Operating Officer at Federal Bank
amazon (company), amazon web services, analytics, chief risk officer, corporates, cryptocurrency, cybersecurity, data center, database, database transaction, derivative (finance), disaster recovery, enterprise risk management, great depression, innovation, intrusion detection system, learning analytics, machine learning, money laundering, risk management, scalability, software , startup company, strategic management, sustainability, telecommuting
Oisin Lunny
Co-founder at Galaxy of OM, S.L.
access to information, accessibility, amazon (company), amazon web services, analytics, assistive technology, authentication, automation, best practice, bit, business, business model, chatbot, chief risk officer, cloud computing, cloud computing security, coal, collaboration, community, competence (human resources), computer network, computer security, computing, corporates, credit card, credit history, cryptocurrency, customer relationship management, customs, cybersecurity, data, data breach, data center, data security, database, database transaction, decision-making, derivative (finance), digital identity, digital transformation, digital wallet, disaster recovery, diversity, ecological resilience, educational technology, email, empathy, engineering, enterprise risk management, evidence-based medicine, evidence-based practice, facebook, financial crisis, financial technology, financialinclusion, google, governance, great depression, information security, infrastructure as code, innovation, internet, intrusion detection system, investment banking, learning analytics, machine learning, managed security service, market (economics), market liquidity, mentorship, mind, mobile phone, money laundering, multi-factor authentication, one-time password, paris agreement, penetration test, privacy, productivity, racial inequality in the united states, reality, recruitment, regulatory compliance, regulatory technology, risk management, roaming, scalability, scientific method, sim card, sim swap scam, smartphone, social equality, social exclusion, social media, social responsibility, software , software development, startup company, strategic management, subscription business model, sustainability, sustainable development, telecommuting, threat (computer), trading room, trust (social science), uber, vulnerability (computing), wildfire
Caleb Kow
Founder at Sign.net
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Celine Heng
Politics & Technology student at Technical University of Munich
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Eric Yip
Senior Product Development Executive at Tezos Southeast Asia
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Mandy Whaley
Partner Director of Product, Azure Dev Tools at Microsoft
#thecube, #womenintech, @thecube, ansiblefest, ansiblefest 2020, application software, automation, cheerleading, cisco, cisco certifactions, cisco devnet, cisco systems, cloud computing, community, computer hardware, dave vellante, devnet, devops, economy, evolution, infrastructure, internet of things, intrusion detection system, jeff frick, john furrier, kubernetes , learning, mandy whaley, netops, organization, scalability, siliconangle, siliconangle inc, siliconangle media inc, software development, technology, telecommuting, thecube, tool, use case, wikibon, women in tech
Marina Yusoff
Associate Professor at Universiti Teknologi MARA
adolescence, algorithm, analytics, apple inc., artificial neural network, automation, deep learning, emerging technologies, evaluation, intelligence, intrusion detection system, machine learning, mathematical optimization, mind, neural network, particle swarm optimization, pattern recognition, random forest, research, robotics, surveillance, swarm intelligence, technology
Fairoza Amira Binti Hamzah
Data Scientist at STMicroelectronics
adolescence, algorithm, analytics, apple inc., artificial neural network, automation, deep learning, emerging technologies, evaluation, intelligence, intrusion detection system, machine learning, mathematical optimization, mind, neural network, particle swarm optimization, pattern recognition, random forest, research, robotics, surveillance, swarm intelligence, technology
V.S. Subrahmanian
The Dartmouth College Distinguished Professor in Cybersecurity, Technology and Society at Dartmouth College
ai, ai applications, artificial, artificial intelligence, chief information officer, coefficient of variation, common vulnerability scoring system, computer intelligence, computer network, computer security, concept, cyber, cyber risk, cyber security, cyberwarfare, dartmouth, dartmouth college, data science, fake news, forecasting, intelligence, intrusion detection system, learning, machine, machine learning, malware, marvin minsky, ml, natural language processing, password, phishing, prediction, reality, risk, security, security hacker, sockpuppet (internet), twitter, v.s. subrahmanian, vulnerability (computing)
1 2 3 4
1-30 of 101