Events Add an event Speakers Talks Collections
 

Conference Speakers

Sort by
Newest
Trending
391-420 of 35910
391-420 of 35910
Filter
Dirk Tiede
Associate Professor at Z_GIS - Department of Geoinformatics, University of Salzburg
arcgis, esri, esri events, geographic information system, gis
Warren Roberts
Coordinator at Rio Hondo College
arcgis, esri, esri events, geographic information system, gis
Madeline Hayes
Laboratory Research Analyst at Duke University School of Medicine. Paramedic.
arcgis, esri, esri events, geographic information system, gis
Marguerite Madden
Professor and Director at Center for Geospatial Research (CGR)
arcgis, education, esri, esri events, geographic information system, gis, imagery, irses, remote, sensing
Timothy Hawthorne
Associate Professor of GIS at UCF
arcgis, esri, esri events, geographic information system, gis
Bo Yang
Ambassador at CitizenM Taipei Northgate
arcgis, esri, esri events, geographic information system, gis
Mark Guizlo
Professor of Geography at Lakeland Community College
arcgis, esri, esri events, geographic information system, gis
Conor Cahalane
Lecturer in Remote Sensing at Department of Geography, Maynooth University
arcgis, esri, esri events, geographic information system, gis
Jarlath O'Neil-Dunne
Director, Spatial Analysis Laboratory at University of Vermont and USDA Forest Service R&D
arcgis, education, esri, esri events, geographic information system, gis, imagery, irses, remote, sensing
Lawrie Jordan
Corporate Director, Imagery and Remote Sensing at Esri
arcgis, education, esri, esri events, geographic information system, gis, imagery, irses, remote, sensing
Jack Dangermond
President at Esri
agriculture, airport, american community survey, analysis, analytics, android (operating system), application programming interface, application software, arcgis, arcmap, attention, big data, biodiversity, brand, building information modeling, cadastre, cartography, census, citizen science, cloud computing, cognition, competition, competitive advantage, computer, computing, concept, conservation (ethic), consumerization of information technology, counter-terrorism, creativity, culture, customer relationship management, database, decision-making, deep learning, demography, digital elevation model, director, ecosystem, education, educational technology, elevation, emergency management, engineering, enterprise resource planning, entrepreneurship, environmental monitoring, esri, esri 2020 federal gis conference, esri events, facebook, fedgis 2020, flood, forestry, future, geocoding, geographic information system, geography, geospatial infrastructure, gis, globalization, google maps, history, hydrological model, hydrology, icon (computing), idea, imagery, information, infrastructure, innovation, intelligence, internet, internet of things, ios, irses, jack dangermond, javascript, jersey, keynote, knowledge, leadership, learning, lidar, lifelong learning, link analysis, literacy, machine learning, magical creatures in harry potter, map, mapping, maps, massive open online course, mentorship, microsoft, military, mind, nation, national geographic society, national geospatial-intelligence agency, national security, national security strategy (united states), nature, natureserve, navy, new jersey, news, non-governmental organization, open data, open science, openstreetmap, organization, planet, point-in-time count, precision agriculture, privacy, problem solving, project jupyter, python (programming language), questionnaire, radio, real-time computing, reason, redistricting, remote, remote sensing, research and development, resource, saddam hussein, sas (software), satellite imagery, science, scientific visualization, scripting language, sea, sense, sensing, server (computing), social media, sociology, software , sonar, soul, space, space race, spatial analysis, special relationship, startup company, statistics, statistics canada, strategy, survey methodology, sustainable development goals, system, technology, tensorflow, time, tongass national forest, training, transport, tree, understanding, united states, united states census, united states census bureau, united states congressional apportionment, united states forest service, united states geological survey, user-centered design, uss ranger (cv-61), vadm sharp, vice admiral robert d. sharp, virtual reality, visual perception, visualization (graphics), water, water quality, water scarcity, web application, web browser, web mapping, web portal, wildfire, world wide web
Geri Miller
Director of Education at Esri
arcgis, education, esri, esri events, geographic information system, gis, imagery, irses, remote, sensing
Zekai Wu
security researcher at Tencent Security Xuanwu Lab
Hao Xing
Researcher at Tencent Security Xuanwu Lab
Kymberlee Price
Open Source Security Program Management Lead at Microsoft Corporation
amazon alexa, application security, cortana, encryption, exploit (computer security), github, hacker culture, information security, internet bot, investor, linux, malware, meltdown (security vulnerability), password, penetration test, post-traumatic stress disorder, social engineering (security), spectre (security vulnerability), startup company, voice user interface, vulnerability (computing), web browser, website, world wide web
Jason Healey
Senior Research Scholar at Columbia University's School for International and Public Affairs
Stephanie Domas
Director of Product Security Strategy at Intel Corporation
Jeff Moss
Commissioner at Global Commission on the Stability of Cyberspace
agile software development, android (operating system), anonymity, anycast, automation, bill booth, black hat, black hat 2018 briefings, black hat 2019, black hat briefings, black hat briefings 2018, black hat keynote, black hat usa, black hat usa 18, black hat usa 2018, black hat usa 2019, blackhat, blackhatusa, blame, christopher krebs, cisa, cold war, compliance (psychology), computer security, con, conference speakers, conversation, corbin souffrant, culture, cyberattack, cyberjunkie, cyberwarfare, decentralization, def, def con 2019, def con 27, defcon, denial-of-service attack, devops, digital journalism, dino dai zovi, disclosure, discovery (law), education, edward snowden, engineer, expert, federal bureau of investigation, feeling, firefox, freebsd, fuzzing, hacker conference, hackers, high-yield debt, international humanitarian law, internet, internet protocol suite, javascript, jennifer granick, ken thompson, kernel (operating system), law, linux, mind, multics, multistakeholder governance model, net neutrality, nothing, operating system, osi model, pablo breuer, privacy, punishment, pwn2own, reason, reasonable doubt, reciprocity (social psychology), request for comments, research, research and development, risk, root name server, runa sandvik, security conference, signal, software bug, software engineering, software engineering institute, software testing, subpoena, thought, time-sharing, tor (anonymity network), transparency (behavior), understanding, united nations, united states department of homeland security, unix, vulnerability (computing), web browser, whatsapp, windows xp, witness
Oryan De Paz
Low-Level Researcher & Developer at Symantec at Javelin
building a diverse security research team, the ripple effect
Omer Yair
Endpoint Team Lead at Symantec
64-bit computing, authentication, building a diverse security research team, call stack, cisco systems, computer security, con, concept, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, eye contact, gadget, hacker, hacker community, hacker conference, hackers, hacking conference, heat, instruction set architecture, jesus, microsoft windows, mind, money, pointer (computer programming), privilege escalation, research, security conference, security conference 2019, service pack, sms, switch, system call, textbook, the ripple effect, twitter, whatsapp, windows vista
Matt Tait
COO at Corellium
contactless deliveries
James Kettle
Head of Research at PortSwigger Web Security
accounting, adobe flash, application programming interface, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blessing, bug bounty program, cache (computing), census, cloudflare, complex system, complexity, computer network, computer security, con, conference speakers, content delivery network, cross-site scripting, cyber security, dc27, deception, def, def con 2019, def con 27, defcon, determinism, dns spoofing, domain name system, drupal, end user, evidence, explosion, facebook, ghost, google search, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, hotspot (wi-fi), html, http cookie, https, hypertext transfer protocol, ice, information, internationalization and localization, internet, internet explorer, intersex, ip address, javascript, kanye west, knowledge, language, malware, microsoft edge, moana (2016 film), music, ocean, open-source software, password, payday loan, perception, pinterest, proxy server, query string, quest, reddit, research, resource, safari (web browser), same-origin policy, security conference, security conference 2019, server (computing), simple plan, siri, sms, smuggling, software bug, synchronization, tax, text messaging, thai language, translation, transmission control protocol, transport-layer protocol, understanding, url, url redirection, user agent, voicemail, web browser, web cache, webcast, website, world wide web
Natalie Silvanovich
Security Researcher at Google
64-bit computing, apple inc., application software, assembly language, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, client (computing), compiler, email, email address, email client, exploit (computer security), google, imessage, instruction set architecture, internet, internet message access protocol, interpreter (computing), ios jailbreaking, java (programming language), javascript, jpeg, language, machine code, magic number (programming), memory, mind, modular programming, multimedia messaging service, music, object (computer science), page (computer memory), pointer (computer programming), program optimization, property list, reserved word, scripting language, serialization, server (computing), sms, software bug, subroutine, variable (computer science), visual voicemail, voicemail, vulnerability (computing), web browser, webassembly, world wide web
Richard Emerson
Senior Cyber Threat Analyst at IBM
security errors
Allison Wikoff
Senior Strategic Cyber Threat Analyst at IBM
security errors
Jen Easterly
Director at Cybersecurity and Infrastructure Security Agency
cybersecurity puzzle
Bart Stump
Labs Manager at Red Sky Solutions
annual black hat, apple inc., black cat (marvel comics), captive portal, cisco systems, email, encryption, http cookie, information security, ipv4, laptop, malware, microsoft, microsoft windows, monero (cryptocurrency), opendns, password, plaintext, privacy, ransomware, service set (802.11 network), shame, twitter, virtual private network, wi-fi, windows update
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 1197
391-420 of 35910