Search for tag: "privacy law"

Rob Krug - Defending Organizations in a Fast-Moving Cyber Arms Race

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…

From  Kathryn Gentilello A week ago 13 views 0  

Karun Rajasekharan and Emil Man - Developing Secure Products

Karun Rajasekharan: Honeywell Building Technologies develops and releases hundreds of products across the globe with over 100 Scrum teams. Product security has been identified as a key product…

From  Kathryn Gentilello 2 Weeks ago 20 views 0  

Sam King - Stopping Fraudsters by Changing Products

Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but…

From  Kathryn Gentilello 3 Weeks ago 21 views 0  

Nir Valtman - Protect Your Unicorn From Hunters

Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a…

From  Kathryn Gentilello 4 Weeks ago 70 views 0  

Maliheh Shirvanian - Device Enhanced Authentication: Passwords and Second Factors

Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification…

From  Kathryn Gentilello A month ago 33 views 0  

Kevin Greene - Forward Leaning - Reshaping and Rethinking Cyber R&D

The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission…

From  Kathryn Gentilello 2 Months ago 61 views 0  

Todd McClelland - The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world

Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business…

From  Kathryn Gentilello 3 Months ago 27 views 0  

Rachel Cummings - The Implications of Privacy-Aware Choice

Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal…

From  Kathryn Gentilello 3 Months ago 29 views 0