“Table Stakes” in the Development and Deployment
of Secure Medical Devices | Oct. 22, 2018


Basic Threat Modeling and Risk Assessment

Fotios Chantzis

What are the chances? Lessons learned from 50 years of predicting risk.

Douglas Clare

DevSecOps For Practitioners | Oct. 22, 2018


Why Security needs to be at the DevOps Table

Chris Perkins

GDPR — General Data Protection Regulation | Oct. 22, 2018


5 Steps Toward GDPR Compliancy in Practice

Pekka Vepsäläinen

Information Security Best Practices and GDPR

Douglas Garrison

Cyber Security for Small and Mid-size Businesses | Oct. 23, 2018


Resources to Prepare for a Possible Cyberattack

Nancy Libersky

How to Jumpstart Your Security Program

Kathy Washenberger

States Are Making Big Moves on Data Privacy Laws – What Does it Mean For You?

Phil Schenkenberg

Communication Strategies and Lessons Learned

Loren Dealy Mahler

Industry Standard Frameworks: What You Need to Know and How to Use Them

Amos Aesoph

Full Summit | Oct. 23, 2018


National Policy Conversation

Matthew Rhoades

Leadership Track: Cyber Operations and Intelligence Essentials for Leaders

Bob Stasio

Technical Track: Security and Threats Around Microservices

Mike Gillespie

How Do You Deal With the Sheer Volume of Security Data?

Peter Brecl

Using Deception Techniques to Create Strong Detection

Tim Crothers

Cybersecurity: How Much Is Enough?

Tony Sager

The Top 10 Things You Must Do to Protect Security Systems from Cyber Attacks

David Tyson

Full Summit | Oct. 24, 2018


The Anatomy of an Email-Borne Attack

Brandon Reid

Economics of Cybersecurity

Scott Borg

Legislative Cyber Security Briefing: IT Security Governance

Tony Sager