Central Ohio Infosec Summit 2016 Videos
These are the videos from the Central Ohio Infosec Summit conference. Thanks to the video volunteers for helping me record.
Track 1
Penetrating the Perimeter - Tales from the Battlefield
Phil Grimes
Detecting the Undetectable: What You Need to Know About OSINT
Jerod Brennen
Why I quit my dream job at Citi
- A data centric approach to key management
Mike Bass
Putting the Intelligence back in Threat Intelligence
Edward McCabe
All Your Door Belong To Me: Attacking Physical Access Systems
Valerie Thomas
The Humanity of Phishing Attack and Defense
Aaron Higbee
The Node.js Highway: Attacks Are At Full Throttle
Joshua Clark
Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway
Understanding Attacker's use of Covert Communications
Chris Haley
InfoSec Productization
David Kennedy
Track 2
Future of Information Security Governance, Risk and Compliance
Max Aulakh, Bill Lisse
How Experts Undermine Your Forensic Evidence
Matthew Curtin
Datacenter Security Virtualized
John Michealson
Embracing the Cloud
Lisa Guess
"It was the best of logs, it was the worst of logs" - Stories through Logging
Tom Kopchak
PKI-Do You Know Your Exposure?
Kent King
No Tradeoffs: Cloud Security and Privacy Don't Need to Be at Odds
Jervis Hui
Today's Threat Landscape
Dean Shroll
6 Critical Criteria For Cloud Workload Security
Sam Herath
2016 Vormetric Data Threat Report - Key Findings
Andy Kicklighter (no audio or live video recorded, so not posted)
Track 2
Educating the Board of Directors
Bob West
Burp Collaborator: The Friend You Didn't Know You Needed
Jon Gorenflo
Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger
Threat Modeling for Secure Software Design
Robert Hurlbut
IAST Deep Dive: Understanding Interactive Application Security Testing
Ofer Maor
Building an Application Security Program
Mike Spaulding
Formal Verification of Secure Software Systems
Aaron Bedra
AppSec without additional tools
Jason Kent
Artificial Intelligence Real Threat Prevention
Art Hathaway
Defending the Next Decade - Building a Modern Defense Strategy
Mark Mahovlich
Track 3
Security vs Compliance in Healthcare
Sean Whalen
Economically Justifying IT Security Initiatives
Ruben Melendez
Cross Industry Collaboration
Helen Patton
Third Party Risk Governance - Why and How
Jeffrey Sweet
IT Data Analytics: Why the cobbler's children have no shoes
Carolyn Engstrom
Food for Thought: Shining Light on Operational Technology Risks
J. Wolfgang Goerlich (not recorded)
Breaking the Phishing Attack Chain
Rafeeq Rehman (not recorded)
Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics
Heather Enlow, Chris Ingram
The Legal Perspective on Data Security for 2016
Dino Tsibouris, Mehmet Munur
The Legal Perspective on Data Security for 2016
Mehmet Munur, Dino Tsibouris
Track 4
Gamify Awareness Training: Failure to engage is failure to secure
Michael Woolard
Office 365 Security and Compliance Cloudy Collaboration – Really?
Robert Brzezinski
State of Security and 2016 Predictions
Jason Samide
A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs
Risk Management: Tactics to Move From Decision to Execution
Tremayne (Tre) Smith
Incident Response - No Pain No Gain!
Jim Wojno
Building an OSS CI/CD Security Toolchain
Kevin Glavin
A Touch(ID) of iOS Security
James (Jamie) Bowser
Track 5
Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski
SecOps: Innovating Security in Innovative Organizations
Warner Moore
You're measuring all the wrong things - information security metrics
Shawn Sines
Why Cybercriminals Are "Following The Money" Into Online Video Games
Matthew Cook
Security Certifications - are they worth it, and which ones are right for you?
William Diederich
Information Security Metrics - Practical Security Metrics
Jack Nichelson
The CONfidence of Things
John Robinson
Security analytics journey - a year's lesson learned.
Mike Schiebel
Track 6
Integrated Software in Networking _ the Mystery of SDN
Oliver Schuermann
Securing our Future: Lessons From the Human Immune System
Gavin Hill
Have you tied together your IAM and Information Security Incident Management Program?
Joseph Greene
Compliance and Security: Building a Cybersecurity Risk Management Program
Jason Harrell
Don't try this at home! (Things not to do when securing an organization)
Jessica Hebenstreit
Apple v. DOJ: Privacy in Today's Enterprise
Justin Harvey
Myths of Cloud Security Debunked!
Bil Harmer
Communicating Security across the C-Suite
Bill Lisse (no audio, so not posted)
Cyber Security - Super Bowl 50
Jim Libersky
Downloads:
https://archive.org/details/CentralOhioInfosecSummit2016
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek