The 2016 session addressed information security, ethical and legal practices, and mitigating cyber vulnerabilities. Participants also learned about the process of incident response and analysis. The content was targeted at ensuring the privacy, reliability, and integrity of information systems.
While much attention is given to compromises of Confidentiality (data breaches) and Availability (DoS), practically speaking all attacks require a compromise of System Integrity in order to succeed.
Scott Taggart, Santanu Das, Ulvi Kasapoglu, Clark Williams, David McSweeney
Innovating in insurance for cyber risk mitigation. Victoria Edmonds, Giles Harlow, Noel Pearman, Sarah Spurling - The Royal Gazette Article
Applying human experts + machine learning for third-party remote code execution risks in Cloud Computing. Hank Chen, Anu Saha, Stephanie Ng
How do you educate two million aditional security professionals by 2020? Samuel Olatunbosun, Taiwo Ajani, Craig Lenahan, Roger Billings, Mohammad Altaf