Central Ohio Infosec Summit 2015 Videos
These are the videos from the Central Ohio Infosec Summit conference. Thanks to the video volunteers for helping me record.
Keynotes
We're At War - Why Aren't You Wearing A Helmet?
Bill Sieglein
Ghost In The Shadows - Identifying Hidden Threats Lurking On Our Networks
Deral Heiland
Rebuilding and Transforming and Information Security Function
Susan Koski
InfoSec’s Midlife Crisis & Your Future...
Tsion Gonen
Current Cyber Threats: An Ever-Changing Landscape
Kevin Rojek
Tech 1
IT Isn't Rocket Science
David Mortman
Mind On My Money, Money On My Malware
Dustin Hutchison
Private Cloud Security Best Practices
Mike Greer
Cyber Espianoge - Attack & Defense
Michael Mimoso
Three Years of Phishing - What We've Learned
Mike Morabito
Physical Penetration Testing: You Keep a Knockin' But You Can't Come In!
Phil Grimes
Tech 2
Building Security Awareness Through Social Engineering
Valerie Thomas & Harry Regan
Modern Approach to Incident Response
James Carder and Jessica Hebenstreit
Using Machine Learning Solutions to Solve Serious Security Problems
Ryan Sevy & Jason Montgomery
Electronic Safe Fail
Jeff Popio
Emerging Trends in Identity & Access Management
Robert Block
Building a Successful Insider Threat Program
Daniel Velez
A New Mindset Is Needed – Data Is Really the New Perimeter!
Jack Varney
OWASP
Software Security Cryptography
Aaron Bedra
Threat Analytics 101: Designing A "Big Data" Platform For Threat Analytics
Michael Schiebel
Developers Guide to Pen Testing (Hack Thyself First)
Bill Sempf f
OWASP 2014 - Top 10 Proactive Web Application Controls
Jason Montgomery
GRC
IAM Case Study: Implementing A User Provisioning System
Keith Fricke
Measuring the Maturity of Your Security Operations Capabilities
Clarke Cummings
Exploring the Relationship between Compliance and Risk Management
Mark Curto
Data Loss Prevention - Are You Prepared?
Jason Samide
Compliance vs. Security - How to Build a Secure Compliance Program
Jeff Foresman
Overview and Analysis of NIST Cybersecurity Framework
Sarah Ackerman
The Explosion of Cybercrime - The 5 Ways IT May Be an Accomplice
Mark Villinski
GRC: Governance, Ruses & Confusion
Shawn Sines
Security
Directions and Best Practices
Kevin Dempsey
Executive
Data Breach: If You're Not Prepared, You Can't Be Responsive
John Landolfi
Strengthening Your Security Program
Chad Robertson
Presenting Security Metrics to the Board
Nancy Edwards
DREAMR - Obtain Business Partnerships
Jessica Hebenstreit
Security Talent In Ohio - A Discussion
Helen Patton
Silos to Seamless: Creating a Comprehensive Security Program
Jeremy Wittkop
Ascending Everest: Managing Third-Party Risk in the Modern Enterprise
Thomas Eck
And Then The World Changed…Again
Jason Harrell
Corporate Uses for Anonymity Networks
Adam Luck
Going To The Dark Side: A Look Into My Transition From Technologist To Salesman
Aaron Ansari
Building An Industrial Controls Cybersecurity Framework (Critical
Infrastructure)
Ernie Hayden
Download:
https://archive.org/details/CentralOhioInfoSecSummit2015
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek