Below is a list of the 2018 Secure360 Twin Cities sessions that have presentation slides available for viewing. Sessions have been listed in alphabetical order. Please click on the session title to view the slides in PDF format:
7 Principles of Successful Cybersecurity Programs | Kaushal Kothari
13 Things to Get You to a Kick A** Security Awareness Program | Tina Meeker and Chrysa Freeman
A Hunting We Must Go | John Strand
A (Mostly) Open Source Vulnerability Assessment Methodology | Andrew Schmitt
A Proposed Security Certification Framework for IoT | Sahar Ismail and Faisal Kaleem
Beyond XP_CMDSHELL: Owning The Empire Through SQL Server | Scott Sutherland
Blockchains are Coming! Forewarned is Forearmed! | David Duccini and Zach Robins
Blue Team on a Budget | Brian Johnson
Cloud Security: So Many Open Source Tools, So Little Time | Matt Farrar
Community Risk and Resilience Through Emergency Management | Judson Freed
Cyber Communications | Loren Dealy Mahler
Cybersecurity Tips, Tools & Techniques | Ron Woerner
Data, Identity & Compliance Under Attack: Trends for 2018 and Beyond | Chris Olive
DevOps Security and Other Diabolically Opposed Malaprops | Brent Lassi
Discussing CyberSecurity with Management | Tom Cocchiarella
Ditch the Whack-a-Mole: Threat Modeling for Systems, Products, and Applications | Marc Boyce
Enabling Risk Based Decisions | Garrett Dietrick
Engagement Depends on Shared Values | Charles Hunt
Engaging The “Participants” | Fred Klapetzky
Evolution of Application Security Programs | Yan Kravchenko
Five Ways to Improve Your Cyber Risk Communications | Christophe Veltsos
FUD and Clinical IoT from the Hospital Perspective | Jennifer Reicherts and Judd Larson
GDPR Is Here! | Ryan Hogan
Hacking WordPress | Bob Weiss
How to Put the Sec in DevOps | Matt Rose
Integrating Security into Emerging DevOps | John Benninghoff
It’s Time to Break Out of the GRC Mold | Christophe Veltsos
Juggling OWASP Top 10 Vulnerability Data | Brian Glas
MacGyver: Building an All Purpose Security Program | Chris Nelson
People-First Security | Ron Woerner
Precursor Detection of Data Exfiltration: Best Practices and Mitigation | Jeremy Swenson
Re-tooling Your Cybersecurity Program: From Staffing to Operational Execution | Steve Brown
Security As Code | Andrew Plato
Security Operations Center: A Guide to Success | Scott McCoy and Gregory Jarpey
The Next Step for United States Currency | Tucker Fiebing
The ROI Of Business Continuity | Regina Phelps
The Security Leader’s Guide to GDPR Compliance | Adam Stone
What to Do About the Growing Lack of Cybersecurity Professionals | Chris Tobkin and Marty McCaslin
Why Breaches Start Everywhere Else…And End Up In Your Lap | Elizabeth Zalman