Data Breach Prevention and Response Summit


2015 Breach Preparedness and Response Study: The 2016 Agenda

Tom Field  •  October 27, 2015


Supply Chain Security - The First and Weakest Link in the Chain?

Jim McConnell  •  October 27, 2015


Incident Response - Practice Makes Perfect - Before an Incident

Michael Theis  •  October 27, 2015


Investigations, Prosecutions and Working with Law Enforcement - The Legal Aspects of Incident Response

Special Agent , Allan Bachman , Jarrett W. Kolthoff, , Camelia Lopez , Jeffrey Shaffer  •  October 27, 2015


Advanced Persistent Confusion: Demystifying APT's and Cyber Attacks

Lance James  •  December 17, 2014


Trust and the APT Defense Framework

Patrick Vowles  •  December 17, 2014


Phase 2 - Cyber Threat Intelligence and OSINT: What You Can Learn About Your Adversaries and What They Can Learn About You

Anthony Giandomenico  •  December 17, 2014


Phase 4 - Security Analytics & Big Data

Rick Gamache  •  December 17, 2014


Upgrading to an APT-Capable Defense; Where to Start, How to Get Funding and See an Immediate Reduction in Risk

Peter Chronis , Joe Doetzl , Kevin Morrison  •  December 17, 2014

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.