top of page
HOME
ABOUT
CALL FOR SPEAKERS
ATTENDEE REGISTRATION
PEAK CYBER VENUE
CONTACT
More
Use tab to navigate through the menu items.
Cybersecurity in Transition: Next Generation Frameworks, Controls, and Engineering - Dr. Ron Ross
Femme Fetale: The Unique Tactics of Female Cyber Fighters - Laura (Francis) Harder
Purple Teaming: Teamwork makes the Dream work - Matt Toth
It ALL leads back to Operations; Leaders Must Be Technical in Cyber! - Dr. Andrew Heo
Securing the Cloud: tactics for reducing your compromise blast radius - Nathan Toups
Log4j: A Group Discussion, after all that, what did we learn - Nathan Stacey
Want to Play a Game? Cyber Attack! - Jordan "Cancer" Scott
Cloud Threats: How Adversaries are Attacking Cloud Environments - Chad Eckles
What’s on your Dance Card? - Craig Hurter
Data Resiliency – Rapid Recovery from Ransomware - Peter D Bille
Today's Cyber Environment: Dealing with the Elephants in the Room - Dr. Dale W. Meyerrose
bottom of page