Data Breach Prevention and Response Summit


Investigations, Prosecutions and Working with Law Enforcement - The Legal Aspects of Incident Response

Chris Calderon , Francoise Gilbert , TiTi Nguyen , Scott Swantner  •  September 8, 2015


Building And Operating A Baseline Defense - The Critical People, Process and Technologies, and as Compliance does not Equal Security, we Must Have the G, the R and the C

Alexander Hughes , Michael Redman  •  July 16, 2015


The Evolution of the Data Breach

Dr. Dale W. Meyerrose , Eduardo Perez  •  July 16, 2015


Advanced Persistent Confusion: Demystifying APT's and Cyber Attacks

Lance James  •  December 17, 2014


Upgrading to an APT-Capable Defense; Where to Start, How to Get Funding and See an Immediate Reduction in Risk

Peter Chronis , Joe Doetzl , Kevin Morrison  •  December 17, 2014


Phase 4 - Security Analytics & Big Data

Rick Gamache  •  December 17, 2014


Phase 2 - Cyber Threat Intelligence and OSINT: What You Can Learn About Your Adversaries and What They Can Learn About You

Anthony Giandomenico  •  December 17, 2014


Trust and the APT Defense Framework

Patrick Vowles  •  December 17, 2014

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.