AustinCyber.Show Blog Posts

Writing Cyber Policies that Aren’t Miserable for Everyone

Watch Full Session Video Watch 2 Minute Clip Nick Leghorn, Director of Application Security, The New York Times Nick's Session ...

The Art of Cyberwarfare Insights from the Author Jon DiMaggio

Watch Video: Watch Jon's Session Video Austin Cyber Show Session: The Art of Cyberwarfare Author Jon DiMaggio Session Title: The ...

New Mathematical Models for Forecasting Cyber Attacks

Watch Video: Watch Charlene's Session Video Session by Charlene Deaver-Vazquez of FISMACS.com Title: New Mathematical Models for Forecasting Cyber Attacks ...

Cyber Book – New Releases: Authors Featured at Austin Cyber Show

The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through their publications. ...

Managing Tactical US Military Networks: HOPE is Not a Plan

Watch Col Wills Session Video Colonel (COL) David Wills, U.S. Army, retired 2021,as the Deputy Director for Command, Control, Communications, ...

Cliff Notes from a CISO Author’s Perspective

Watch Gary's Session Videoo Austin Cyber Show Session by Gary Hayslip Author CISO Executive Primer Title: Cliff notes from a ...

Anatomy of a Cyber Attack

Full 37 Minute Video Most cyber professionals don't have the opportunity to see an actual cyberattack play out. They understand ...

Defend the “when” with Network Intelligence

Short Highlight Video Full Session Video Visit ExtraHop.com for more information. Defend the “When” with Network Intelligence Perhaps the oldest ...

Unleash the Full Potential of Network Detection and Response NDR

Full 38 Minutes Session Video Unleash the Full Potential of Network Detection and Response Consider the anatomy of a cyberattack. ...

Mother’s Day Lost Wallet Challenge

As your lovely mother walks out the door on this mother’s day, she backs out of the driveway to leave, ...

CISO: Day in the Life of CISO’s Sameer Sait & Mustapha Kebbeh

CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...

Day / Week / Month in the Life of a CISO: Sameer Sait & Mustapha Kebbeh

CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk ...

The Big Disruption in Cybersecurity

The Big Disruption in Cybersecurity Security awareness & training programs and content has improved dramatically in recent years, yet security ...

Data Verses Measurement: Metrics are Not Enough

Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and ...

30+ AustinCyber.Show Speakers and Sessions in Under 60 Seconds

See it all in 55 seconds. Then pick the sessions of interest for the list of blogs below. In random ...

Assigning Cost to Security Risk

Assigning Cost to Security Risk. The importance of communicating cyber risk in financial terms to the board is growing day ...

Networked Medical Device Connectivity Security

Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patient monitors, ...

Social Engineering Cyber Attacks

Social Engineering Attacks: Why do we fall for them and what we can do about it. By Dr. Ian Wilkinson ...

Cyber Incident Response Case Study

In this session Brian Clinkenbeard, one of the prolific and beloved security gurus of the industry, will look at exposing ...

Mystery Solved: Deep Packet Security Analysis

Mystery Solved: Deep Packet Security Analysis TLS version and cipher suite are the two most critical parameters negotiated during the ...

Constantly Changing Cybercrime

The nature of cybercrime is constantly changing and becoming more difficult to defend. This session will evaluate some of these ...

Navigating Global Public Web Server Privacy Laws

Protecting customer's data privacy has become a new source of stress for any company with a web presence. Compounding that, ...

Five Ways Attackers Leave Ransomware Vulnerable to Detection

One Minute Highlight Clip Full 36 Minute Session Five Ways Attackers Leave Ransomware Vulnerable to Detection Ransomware has evolved and ...

Reclaiming Your Identity

Reclaiming Your Identity Learn how to claim your identity before criminals do, or reclaim your identity after criminals have used ...

Cybersecurity over the horizon: the future of cybersecurity

We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for organizations facing new ...

What Drives Security Convergence?

This session will report on some observations about how the degree of convergence of physical and cyber security is evolving ...

Remaining Ransom Aware: What to Do When One Gets Past the Goalie

Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best approached from a ...

Building a Security Team that Never Says No

Building a Security Team that Never Says “No” One of the most prevalent perceptions of any security team is that ...

Building a Modern SOC Requires Attack Surface Validation

Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires continuous validation of the ...

Security Leaders Use Ranges & Simulation to Improve Their Security Posture

Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what ...

Double Espresso Morning Cyber Brief to Start the Day

May 10-11 2022 Session by James Azar CyberHub Podcast Title: Double Espresso Morning Cyber Brief to Start the Day Join ...

Breach Defense Certificate

Breach Defense is one of five Certificates offered. Breaking down the anatomy of a massive breach starts with a diagram ...

Exfiltration Prevention Certificate

The fundamentals of Exfiltration prevention start with Data Loss Prevention DLP. Below is a diagram of various DLP methods designed ...

IETF’s New “TCP” QUIC Certificate

Near 50 years ago Internet Protocol Pioneers imagined a network that would interconnect people around the world. Little by little ...
Scroll to Top