• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Speaker Slides Twin Cities 2018

Below is a list of the 2018 Secure360 Twin Cities sessions that have presentation slides available for viewing. Sessions have been listed in alphabetical order. Please click on the session title to view the slides in PDF format:

7 Principles of Successful Cybersecurity Programs | Kaushal Kothari

13 Things to Get You to a Kick A** Security Awareness Program | Tina Meeker and Chrysa Freeman

A Hunting We Must Go | John Strand

A (Mostly) Open Source Vulnerability Assessment Methodology | Andrew Schmitt

A Proposed Security Certification Framework for IoT | Sahar Ismail and Faisal Kaleem

Beyond XP_CMDSHELL: Owning The Empire Through SQL Server | Scott Sutherland

Blockchains are Coming! Forewarned is Forearmed! | David Duccini and Zach Robins

Blue Team on a Budget | Brian Johnson

Cloud Security: So Many Open Source Tools, So Little Time | Matt Farrar

Community Risk and Resilience Through Emergency Management | Judson Freed

Cyber Communications | Loren Dealy Mahler

Cybersecurity Tips, Tools & Techniques | Ron Woerner

Data, Identity & Compliance Under Attack: Trends for 2018 and Beyond | Chris Olive

DevOps Security and Other Diabolically Opposed Malaprops | Brent Lassi

Discussing CyberSecurity with Management | Tom Cocchiarella

Ditch the Whack-a-Mole: Threat Modeling for Systems, Products, and Applications | Marc Boyce

Enabling Risk Based Decisions | Garrett Dietrick

Engagement Depends on Shared Values | Charles Hunt

Engaging The “Participants” | Fred Klapetzky

Evolution of Application Security Programs | Yan Kravchenko

Five Ways to Improve Your Cyber Risk Communications | Christophe Veltsos

FUD and Clinical IoT from the Hospital Perspective | Jennifer Reicherts and Judd Larson

GDPR Is Here! | Ryan Hogan

Hacking WordPress | Bob Weiss

How to Put the Sec in DevOps | Matt Rose

Integrating Security into Emerging DevOps | John Benninghoff

It’s Time to Break Out of the GRC Mold | Christophe Veltsos

Juggling OWASP Top 10 Vulnerability Data | Brian Glas

MacGyver: Building an All Purpose Security Program | Chris Nelson

People-First Security | Ron Woerner

Precursor Detection of Data Exfiltration: Best Practices and Mitigation | Jeremy Swenson

Re-tooling Your Cybersecurity Program: From Staffing to Operational Execution | Steve Brown

Security As Code | Andrew Plato

Security Operations Center: A Guide to Success | Scott McCoy and Gregory Jarpey

The Next Step for United States Currency | Tucker Fiebing

The ROI Of Business Continuity | Regina Phelps

The Security Leader’s Guide to GDPR Compliance | Adam Stone

What to Do About the Growing Lack of Cybersecurity Professionals | Chris Tobkin and Marty McCaslin

Why Breaches Start Everywhere Else…And End Up In Your Lap | Elizabeth Zalman

 

 

Primary Sidebar

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.