Abstract: Coming Soon. Joseph Adams is the Director of Cyber Defense Operations for Duke Energy. He is responsible for the Cybersecurity Operations Center, Cyber Systems Engineering / Support team...
Joseph Aguayo is Principal Data Scientist for Corporate Information Security at BB&T / Truist. He is responsible for protecting critical infrastructure with full-stack security analytics,...
Joel recently joined UNC Charlotte's College of Computing and Informatoics as part of the adjunct faculty in the Fall of 2019. Joel is a lecturer and Director level IT professional with...
Rich Baich is AIG’s Chief Information Security Officer. In this role, he is responsible for developing, implementing, and operating an information security strategy to address AIG’s cyber risks. He...
Tom Bartolomeo is the head of Wells Fargo’s Cyber Security Defense and Monitoring (CSD&M) organization. He brings 23 years of information security experience and 35 years of financial...
Abstract: As organizations contemplate, develop, and mature their Cyber Fusion Centers, market leaders are leveraging the synergies with Fraud Operations. Fusing Fraud Operations and Cyber...
Abstract: Organizations’ approach to cybersecurity have matured and have recognized the necessity to perform enterprise risk management efforts. The NIST Cybersecurity Framework has significantly...
Abstract: As organizations contemplate, develop, and mature their Cyber Fusion Centers, market leaders are leveraging the synergies with Fraud Operations. Fusing Fraud Operations and Cyber...
Matt Donato’s passion for placing the right talent with the right company combined with his in-depth knowledge of the cybersecurity industry makes him an indispensable partner in the tech community....
Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at using risk quantification to implement, mature, and sell information risk and security programs. Jack...
Abstract: In this panel discussion, SOC leaders offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your...
Abstract: In this eye-opening presentation, Chris will talk about social engineering through a scientific lens. He will provide an interesting and often overlooked glimpse into the “why” behind the “...
Abstract: Coming Soon. Terry Halvorsen started with Samsung electronics on April first of this 2017 as an Executive Vice President in the Business to Government group. He has since been...
Abstract: Small Businesses face similar cybersecurity risk as large corporations and yet they have much less resources to devote to preventing data breaches. UNC Charlotte’s Annual Cybersecurity...
Alex Hutton is the technology executive over the Application Defense and Cybersecurity Analytics teams in Bank of America’s Cybersecurity Defense function. Prior to this position, his...
Abstract: What will security look like in the next 20 years? What technologies will need security, and what will security work look like? In this session, Todd Inskeep will provide a...
Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be...
Abstract: Review some of the cybersecurity priorities required for Smart Cities Innovations, including: • Establishing assured identity to improve our posture in zero trust environments •...
Abstract: If you've ever worked in cybersecurity, you know that defense is a team sport. The difference between every win and loss is directly related to the strength, speed, and agility of our teams...
Abstract: The move to incorporate security into the DevOps pipeline has gotten world wide attention. DevSecOps has become an essential consideration for DevOps transformation initiatives. In this...
Andre Mintz joined Red Ventures in 2017 to shape all aspects of our information security strategy and to mitigate data security-related risks. He plays a key role in protecting our partners and...
Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the...
Max M. Morris is the Senior Director of Cyber Defense and Response for Ally Bank. In his role, Max leads a group of cyber security professionals who run the company’s Security Operations Center,...
Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the...
This presentationl will discuss the patchwork of cybersecurity laws affecting US companies, including Europe’s recent General Data Protection Regulation (GDPR) and the upcoming California Consumer...
Abstract: Organizations’ approach to cybersecurity have matured and have recognized the necessity to perform enterprise risk management efforts. The NIST Cybersecurity Framework has...
Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be encrypted...
Abstract: We need to be talking about cyber safety rather than just security since the future of our industry will depend on our ability to engage users and arm them to make decisions against ever...
Abstract: Yonatan Striem-Amit, will discuss the future of advanced, nation state threats as they continue to develop and move into the private sector. We will examine the recently discovered APT...
Abstract: New digital services and connected industrial controls systems continue to be at high risk from security breaches with subsequent impacts to consumer privacy and now personal safety. The...
Abstract: In this talk, we will talk about the security issues for blockchains and Byzantine Fault Tolerance problems. Specifically, we will analyze and discuss the insecure aspects of the well...
Abstract: As security programs evolve to combat clever and persistent adversaries, they look for solutions to tip the scales of attacker and defender economics to provide the defender the advantage....
Tom Watson has over 20 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of...
Abstract: In 2009, we were awakened to Allspaw and Hammond’s “10 deploys a day”. In 2010, Jez Humble and Dave Farley advised us to “build quality in”. But in 2019, breaches hit 24% of software...
Terry Ziemniak has over 25 years' experience in the information security field with work ranging from security architecture, pen testing, operations, auditing, risk management, disaster preparedness...