Sched.com Conference Mobile Apps
The Diana Initiative 2020
has ended
Create Your Own Event
The Diana Initiative 2020
-
Saved To
My Schedule
Welcome to Diana Initiative 2020 Virtual Conference.
For more information, please see our web site here :
https://www.dianainitiative.org
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Attendees
Welcome
Search
or browse by date + venue
Expo Hall
Keynote
All
Closing Keynote
Opening Keynote
Social
Talk - Red Team Village
Talk Track1
Talk Track2
Talk Track3
Talk Track4
Village Workshop
Popular
menu
Menu
Log in
Schedule
Speakers
Sponsors
Exhibitors
Attendees
Welcome
Search
Popular Events
#1
A case against “Google it”: A cognitive science approach
#2
Digital Forensics and Data Finding
#3
Ten Things Every Cyber Security Job Seeker Should Know
#4
Introduction to Capture-the-Flag (CTF)
#5
Breaking into Cybersecurity or Increasing Your Knowledge For Free (or Close to It)
#6
Guardians of the cloud: the sysadmin's guide to cloud security
#7
Women in Threat Intelligence - from on the ground to in the cloud
#8
Cyber Harassment: Things I wish I knew when sh1t went sideways
#9
Trust, No Trust or Zero Trust - Myth Demystifying
#10
Low Tech & Insecure: Building Better Boundaries at Work and in Life
#11
IoT Honeypots and Rogue Appliances
#12
Exploiting Sexual Exploitation
#13
Hiding In The Clouds: How Attackers Can Use Applications Consent for Sustained Persistence and How To Find It
#14
Getting Paid Like a Boss
#15
Automating Threat Hunting on the Dark Web and other nitty-gritty things
#16
7 Tips for Women To Get To the Top in Technology
#17
Election Security 101
#18
Incident Communications 101 - Breaking the Bad News
#19
Levelling up the Estrogen in the Cyber World
#20
No Mom, I’m not a Hacker
#21
I’m a hunter! Cyber Intelligence the new(ish) frontier.
#22
Into the unknown: From a stay-at-home parent to an InfoSec career
#23
Application Security: OAuth 2.0 and OpenID Connect
#24
Security and storytelling: Strengthening behavioral habits and security culture at Robinhood
#25
More than just pipelines: DevSecOps
#26
Secrets of the Second Factor
#27
DevSecOps – It’s A Team Sport
#28
CTI Mindset as a Technique for Blue Teamers
#29
Products People Trust: Privacy, Consent, & Security
#30
How To See Your Own Perception Bias
#31
Bug Bounty Craze
#32
Breaking Down Barriers to InfoSec for Neurodivergent Individuals
#33
Broken Arrow
#34
Hacking into Android Ecosystem
#35
The Bug Hunter’s Methodology v4: Reconnaissance
#36
There were NO REFRESHMENTS at the Networking Event...Tales of a Clueless First Year Cybersecurity Student
#37
Deploying discreet infrastructure for targeted phishing campaigns
#38
My AWS Access Key Nightmares... and Solutions
#39
Unmasking the Avengers: Shifting Roles of Facial Recognition
#40
How an SRE became an application security engineer (and you can too!)
#41
Cyber Performance and Risk Quantification: Enabling Security Decision Makers
#42
Testing all the things - We can't catch 'em all and who's accountable anyway?
#43
Critical Infrastructure, Interconnected Risks, and Resiliency. Why Women Should Care?
#44
It's a Human Thing: Strategies for Navigating Diversity & Inclusion in your Organization
#45
What if we had TLS for Phone Numbers? An introduction to SHAKEN/STIR
#46
Ch-ch-changes!
#47
How to sink the ducky and other tricks
#48
Security at Coinbase
#49
Conference Submissions for the Faint of Heart
#50
Critical Infrastructure, Interconnected Risks, and Resiliency. Why Women Should Care?
Popular by Type
All Types
Expo Hall
Keynote
Social
Talk - Red Team Village
Talk Track1
Talk Track2
Talk Track3
Talk Track4
Village Workshop
Popular by Day
All days
Friday, Aug 21
Saturday, Aug 22
Recently Active Attendees
Shanni Prutchi
Aeva Black
Breanne Boland
Fernando Montenegro
Jen McConnell
BC
balu, chitra
Vicky Twomey-Lee
AK
Ana Knickerbocker
More →