Cybersecurity Crash Course - Day 1


Tim Wilson (Editor in Chief, Dark Reading)

Sara Peters (Senior Editor, Dark Reading)

Date: Monday, April 30

Time: 9:00am - 5:00pm

Pass Type: All Access, Summits & Workshops

Format: Summit

Track: Security

Vault Recording: TBD

Note: an RSVP is required for Workshops & Summits. Please RSVP by making your selections in your registration account.

An intensive, two-day event for IT pros who need to bone up on information security essentials
If you are an IT pro who needs a fast, comprehensive, and authoritative course that will catch you up on all of the latest developments and thinking about data security, then Dark Reading’s Cybersecurity Crash Course is for you. Taught by recognized experts in their respective areas of security specialty, the Cybersecurity Crash Course offers two days of education that will give you the fundamental concepts you need to understand today’s security challenges, as well as an overview of the latest attacks, threats, and vulnerabilities that put enterprises at risk. You’ll get insights on the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you “security savvy” by giving you the basics you need to understand the threats and responses, while at the same time catching you up on the latest exploits being perpetrated by computer criminals, nation-states, and hacktivists. Best of all, uou’ll have an opportunity to ask the experts questions about specific threats to your environment – in a supportive, safe, and intimate setting where there are no dumb questions.

Day 1 Agenda: Cyber Defender Crash Course

8-9am Breakfast

9-9:45am The State of the Enterprise Security Department

9:45-10:30am Five Key Elements of Enterprise Security

10:30-10:45am Break

10:45-11:00am Lightning Talk 1

11:00-11:45am Principles of Endpoint Defense

11:45am-1:00pm Lunch

1:00-1:45pm The Unseen Insider Threat: Negligence

1:45-2:30pm Application Security: How to Develop Secure Software and What to Do When It Isn’t

2:30-2:45pm Break

2:45-3:30pm Defending Your Data In the Service Provider’s Cloud

3:30-3:45pm Lightning Talk 2

3:45-4:30pm Blockchain Technology Explained

4:30-5:15pm Hacking Everything: The Dark Side of the Internet of Things