Category: Security Talks

  • Security Leadership

    Security Leadership

    This talk delves into the intersection between security–helping make wiser risk choices–and leadership–getting more done with a lower energy cost. It draws on the lessons of the Six Leadership Disciplines and Humans are Awesome at Risk Management talks, providing a handful of examples of specific leadership skills to practice. The 24 skills in the matrix…

  • 9 CISO Questions

    9 CISO Questions

    Summary Everybody sells, right? Wrong. Unless you’re taking an order and retiring your quota, you don’t sell – instead, you market. If you’re selling to a CISO, you need to understand the organizational dynamics that surround a CISO’s decision-making process. This talk walks through nine critical questions that CISOs need to understand the answers to…

  • Hacking Harry Potter

    Hacking Harry Potter

    The Untold Story of Fantastical Social Engineering. Hidden inside the story of Harry Potter is a most subtle of social engineering attacks. Explore how J.K. Rowling hid the world’s greatest villain in plain sight. This talk explores the world of Harry Potter from a different angle: that of the villain. In this talk, given in…

  • Four Dimensions of Building a Security Program

    Four Dimensions of Building a Security Program

    How do you know what to invest in next, or whether the time and energy that you’re spending on a security technology or program is a good investment?  Learn how veteran CSOs think about security investments, and develop your own rubric for evaluating where to best make your next security improvement.

  • Defense Against the DDoS Arts

    Defense Against the DDoS Arts

    How do you design defenses against DDoS? And how do you think about them from a policy perspective?

  • Humans are Awesome at Risk Management

    Humans are Awesome at Risk Management

    How do humans make risk decisions, and are they good, bad, or something else?

  • Security’s Grand Challenges

    Security’s Grand Challenges

    How do the grand challenges of the future look like the grand challenges of the past?

  • Zero Trust: Ditching Your Firewall

    Zero Trust: Ditching Your Firewall

    What does a Zero Trust journey look like? Explore how we migrated Akamai to a zero trust network access model, before that was even a phrase people knew.