2018 Dallas Fraud & Breach Prevention Summit
Category

2018 Dallas Fraud & Breach Prevention Summit

Hear from industry leaders with specialties ranging from IoT and the emerging use of deception technology, to the ever-persistent and ongoing business email compromise trend, DDoS for extortion and ransomware attacks, 2018 promises to have more than enough for all of us to talk about and learn from each other. We have intentionally designed our sessions to address the needs of CISOs, fraud and risk teams, security and IT professionals, and many others by providing hands-on tools and real-world problems and solutions that attendees can take back to their offices.

Sessions from our Summit in Dallas, TX on April 24 - 25, 2018

Yes, You Can Get Burned When It's Cloudy

Katie O'Shea - Check Point  •   • 

Start this Session

Cybercrime Exposed: Insights from a Former U.S. Most Wanted Cybercriminal

Brett Johnson - "The Original Internet Godfather"  •   • 

Start this Session

Incident Response Plans: Avoiding Common Mistakes through a Table Top Exercise

Ronald Raether - Partner at Troutman Pepper  •   • 

Start this Session

Post-EMV: The Present and Future of Retail Fraud

Jon Phillips - Neiman Marcus Group , Dr. Shamoun Siddiqui - Neiman Marcus  •   • 

Start this Session

How to Start up an Insider Threat Program

Jason Clark - Carnegie Mellon University CERT Insider Threat Center  •   • 

Start this Session

Panel: Know Your Attacker: Lessons Learned from Cybercrime Investigations

Matthew Maglieri - Ruby, parent company of Ashley Madison , Richard Murray - FBI Dallas Cyber Task Force , Ronald Raether - Partner at Troutman Pepper  •   • 

Start this Session

Industrial Control Systems: How to Mitigate Espionage, Breach and Other Risks

Asif Effendi - GE Oil & Gas - Digital  •   • 

Start this Session

The Legal Case for Cyber Risk Management Programs and What They Should Include

Jay Johnson - Jones Day , Shawn Tuma - Spencer Fane LLP  •   • 

Start this Session

Critical Infrastructure Protection: Making Public/Private Partnerships Work

Session In Development  • 

Tara Brewer - US Department of Homeland Security , Ian Schneller - Bank of America  •   • 

Preview this Session

Panel: Build or Buy? The CISO's Guide to How to Develop Advanced Defense

Brian A. Engle, CISSP, CISA - Riskceptional Strategies , Parrish Gunnels - Kibo Commerce , Brian Wrozek - Optiv  •   • 

Start this Session

DDoS: Updates from the Battlefield

Mike Boose - Arbor Networks  •   • 

Start this Session

Blockchain as a Tool for Fraud Prevention

David Houlding - Microsoft  •   • 

Start this Session

Session Contributors

Asif Effendi

Director of Security, GE Oil & Gas - Digital

Read Bio
Brett Johnson

Former Most Wanted and "The Original Internet Godfather"

Read Bio
Brian A. Engle, CISSP, CISA

Founder and CEO, Riskceptional Strategies

Read Bio
Brian Wrozek

Managing Executive Director, Office of the CISO, Optiv

Read Bio
Dan Mathews

Director of Sales Engineering, Lastline

Read Bio
David Houlding

Principal Healthcare Program Manager, Microsoft

Read Bio
Ian Schneller

SVP, Global Information Security, Bank of America

Read Bio
Jason Clark

Insider Threat Researcher, Carnegie Mellon University CERT Insider Threat Center

Read Bio
Jay Johnson

Partner, Jones Day

Read Bio
Jim Apger

Sr Security Architect, Splunk

Read Bio
Jon Phillips

VP Loss Prevention, Neiman Marcus Group

Read Bio
Katie O'Shea

Cloud Security Specialist, Check Point

Read Bio
Mark Loveless

Senior Security Researcher, Duo

Read Bio
Matthew Maglieri

CISO, Ruby, parent company of Ashley Madison

Read Bio
Mike Boose

Channel/Partner Sales Engineer, Arbor Networks

Read Bio
Parrish Gunnels

CISO, Kibo Commerce

Read Bio
Richard Murray

Supervisory Special Agent, FBI Dallas Cyber Task Force

Read Bio
Ronald Raether

Partner, Partner at Troutman Pepper

Read Bio
Shawn Tuma

Attorney, Spencer Fane LLP

Read Bio
Tara Brewer

Cyber Security Advisor Program, Office of Cybersecurity and Communications, US Department of Homeland Security

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.