Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
20 Questions to Ask Yourself before Giving a Security Conference Talk
Newest First  |  Oldest First  |  Threaded View
cybersavior
cybersavior,
User Rank: Strategist
10/23/2017 | 12:27:05 PM
You're the presenter for a reason.
You're in the limelight because you have something truly enlightening to enrich the audience with and an innovative or organized way to do it. 

If you don't have that, sit your self-important, grandstanding self down in the audience an learn from those presenters that do. 
geraldamcdade
geraldamcdade,
User Rank: Apprentice
10/20/2017 | 5:42:05 AM
Write My Dissertation for Me
Thanks for sharing
Mark.Majestic
Mark.Majestic,
User Rank: Apprentice
10/17/2017 | 10:03:19 AM
Boasting about your company's security posture can make you a target.
I like the advice.  Applies to any presentation.

However, be careful when presenting on your security posture/project/prowess.  Unfortunately, It could make you a target from people who want to make a point.
Mr Phen375
Mr Phen375,
User Rank: Apprentice
10/17/2017 | 3:46:39 AM
20 Questions to Ask Yourself before Giving Any Conference Talk
I think these questions are relevant and must be asked before giving any type of conference talk.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32915
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43864
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43865
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43866
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43867
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.