 |
 |
 |
Welcome and Opening Remarks – Day 1
Col. Stefanie Horvath; Dave Notch |
National Policy Conversation
Matthew Rhoades
|
Cyber Operations and Intelligence Essentials for Leaders
Bob Stasio |
|
|
|
 |
 |
 |
How Do You Deal With the Sheer Volume of Security Data
Peter Brecl |
Using Deception Techniques to Create Strong Detection
Tim Crothers |
Cybersecurity – How Much Is Enough?
Tony Sager |
|
|
|
 |
 |
|
Panel – What’s Working – Information Across Companies and Industries |
The Top 10 Things You Can Do to Protect Security Systems from Cyber Attacks
David Tyson |
|
|
|
|