Below is a list of the sessions that have presentation slides available for viewing. Click on the session title to view the slides in PDF format:
Keynote Speakers:
Theresa Payton’s “Plan of Attack” take-away packet
Tuesday Sessions:
Active Defense and Hacking Back (Parts 1 and 2)
BCP Trends and What We Can Expect in the Future
Data Protection Starts with Physical Security
Detecting and Responding to Log Trails from Advanced Threats and Frauds
Holistic View of Industrial Control Cyber Security
Integrate Part One Critical Incident Response
Physical Access Controls Mitigate SE Risks
Risk Intelligence What your C-Suite Expects
Third Party Risk Management Information Security
Top 10 SAP Audit-Security Risks
Users Your First Line of Defense
Wednesday Sessions:
2013-2014 Threat Review and Strategy Planning
Cyber War! Yes, It’s Happening Now!
FUFW: 5 Steps Perimeter Re-architecture
Generation Next new paradigms for BCDR
How IT Can translate Complex Information for Non-IT Folks
Lets get Practical – Real World BCP and Exercising
The CISO Guide How Do You Spell CISO
The Rise of Compliance-Driven Security