RiskSec 2019 marked the first time SC Media’s industry-leading event was held in Philadelphia. With 200 people and 17 vendors in attendance the event took over the entire Convene exhibit space at the 30th Street train station and featured keynotes, panels and track sessions that covered topics from legislating cybersecurity to acquiring and using threat intelligence to better understanding how IoT devices can be handled in a large organizations. The event’s capstone was a red on blue event that saw a team comprised of university cybersecurity students fend off an attack with critical insight being given by a panel of experts.
- Israel’s air strike of a Hamas cyber operations facility last weekend is not a game changer that opens the door for future military attacks as a common response to offensive cyber activity, according to Duke University Cyber Scholar Zhanna Malekos Smith, speaking at SC Media’s RiskSec conference today. “There are some people who say, ‘We’ve…
- We’ve all heard how IoT technologies have and will continue to cause massive challenges to the execution and maintenance of security controls for organizations. How can security teams implement plans and policies to address the security vulnerabilities wrought by IoT-related technologies being leveraged in their organization’s building, products and more? At RiskSec 2019, gain a…
- Enlisting FUD (fear, uncertainty and doubt) to argue for security budgets was commonly practiced by many security pros back in the day. It’s not a useful tactic nowadays, although more widespread hype about cybersecurity threats is common in mainstream coverage and some marketing collateral directed at executives less knowledgeable about industry happenings. At RiskSec 2019…
While RiskSec’s panels were packed with helpful information Jessica ‘Zhanna’ Malekos Smith of the Duke Center on Law & Technology (DCLT) and the Center on Law, Ethics, and National Security also offered these extra resources.
- Cyber Economic Espionage
- Information Warfare – Understanding the Reflexive Control Technique
- Twilight Zone Conflicts – Employing Gray Tactics in Cyber Operations
Scenes from RiskSec 2019