REGISTRATION RATES
 

REGISTRATION TYPE

EARLY BIRD (ENDS MAY 8TH)

REGULAR RATE

ISSA/ISACA Members

$99

$150

Non Members

$175

$250

Government:

$150

$200

Students

-

$65

Community Sessions

FREE

FREE

Included in Full Conference registration: 

  • 3 Keynotes
  • 6 Breakouts with 50+ educational sessions 
  • 12 escape room times
  • Over 18 exhibit booths
  • Access to On-Demand session recordings  post-conference
  • 50+ CPE credits available

 

Community Sessions Agenda HERE

AGENDA (Subject to Change)

Time Name Speakers Track More Info
8:30 AM - 9:45 AMOpening Keynote with Chris Hadnagy: Using Science to Combat Social EngineeringKeynote
10:00 AM - 11:00 AMA1. Your AppSec Metrics Aren't Helping Your AppSecAppSec & DevSecOps
10:00 AM - 11:00 AMA2. BloodHound: Use and AbuseArchitecture & Operations
10:00 AM - 11:00 AMA3. Adaptive Assurance: Integrating Requirement Complexity and AutomationRisk & Compliance
10:00 AM - 11:00 AMA4. CMMC is Coming…It’s Not Stopping with the DoD… Are You Ready?Emerging Trends
10:00 AM - 11:00 AMA5. Managing Third-Party Risk in the Age of RansomwareIncident Response & Threat Intelligence
10:00 AM - 11:00 AMA6. Concrete Steps Toward a Leap of FaithSecurity Management
10:00 AM - 11:00 AMA7. Operationalizing Governance, Risk and ComplianceVendor
10:00 AM - 11:00 AMA8. An Impossible Years’ Impact on ProbabilityVendor
10:00 AM - 11:00 AMA9. Living Security Virtual Escape Room 1Escape Room
11:15 AM - 12:15 PMB1. Penetration Testing for the SDLCAppSec & DevSecOps
11:15 AM - 12:15 PMB2. Better Living Through Better PasswordsArchitecture & Operations
11:15 AM - 12:15 PMB3. Breaking Dark Web BarriersIncident Response & Threat Intelligence
11:15 AM - 12:15 PMB4. ISO 27701 Versus NIST Privacy FrameworkPrivacy
11:15 AM - 12:15 PMB5. What You Don't Know About SAP Security Could Hurt YouSecurity Management
11:15 AM - 12:15 PMB6. Lean CISOs - Thriving Through Adversity (2020 and Beyond)Soft Skills
11:15 AM - 12:15 PMB7. Why You Can't Trust Vendor QuestionnairesVendor
11:15 AM - 12:15 PMB8. Security Analytics: Seance or Silver BulletVendor
11:15 AM - 12:15 PMB9. Living Security Virtual Escape Room 2Escape Room
12:15 PM - 12:30 PMClosing 
Time Name Speakers Track More Info
8:30 AM - 9:45 AMKeynote with Jennifer Brown: The Inclusive LeaderKeynote
10:00 AM - 11:00 AMC1. Scaling Threat Modeling with Security ChampionsAppSec & DevSecOps
10:00 AM - 11:00 AMC2. Interviewee Field Manual: Hack the InterviewSoft Skills
10:00 AM - 11:00 AMC3. A Free and Open InternetAudit & Risk Management
10:00 AM - 11:00 AMC4. The Anatomy of an Orchestrated Attack: Information HijackingEmerging Trends
10:00 AM - 11:00 AMC5. Get $50 Gift Certificate While Learning to Protect Your Company from PhishingIncident Response & Threat Intelligence
10:00 AM - 11:00 AMC6. Negotiating Cyber Insurance: What to Look ForPrivacy
10:00 AM - 11:00 AMC7. The Importance of a Risk Aware Culture: Why Organizations Should Be Thinking More About Insider RiskVendor
10:00 AM - 11:00 AMC8. Delivery Failed: Preventing ransomware by detecting its precursorsVendor
10:00 AM - 11:00 AMC9. Living Security Virtual Escape Room 3Escape Room
11:15 AM - 12:15 PMD1. Service Mess to Service MeshAppSec & DevSecOps
11:15 AM - 12:15 PMD2. 7 Steps to Zero TrustArchitecture & Operations
11:15 AM - 12:15 PMD3. Benefits and Limitations of Attorney-Client Privilege: What Can Your Attorney Do for You?Risk & Compliance
11:15 AM - 12:15 PMD4. What are Colorado Governments Doing About Cyber Security?Emerging Trends
11:15 AM - 12:15 PMD5. A New Urgency: Time to Review Your IAM ProgramSecurity Management
11:15 AM - 12:15 PMD6. Anti-Forensics: Reverse Engineering a Leading Phone Forensic ToolPrivacy
11:15 AM - 12:15 PMD7. API Security: Separating Fact from Fiction NameVendor
11:15 AM - 12:15 PMD8. DevSecOps + Cloud Security: 5 Tips From the FrontlinesVendor
11:15 AM - 12:15 PMD9. Living Security Virtual Escape Room 4Escape Room
12:15 PM - 12:30 PMClosing 
Time Name Speakers Track More Info
8:30 AM - 9:45 AMCISO PanelKeynote
10:00 AM - 11:00 AME1. CFP - Shift Left with DevSecOps: Scanning Every Single Code ChangeAppSec & DevSecOps
10:00 AM - 11:00 AME2. Identity is the Perimeter: Beyond the Zero Trust HypeArchitecture & Operations
10:00 AM - 11:00 AME3. IT Risk and Resilience - Cybersecurity Response to COVID-19 Risk & Compliance
10:00 AM - 11:00 AME4. Adversary-Based Threat Modeling and Risk AnalysisSecurity Management
10:00 AM - 11:00 AME5. Cryptojacking - TTPs Past, Present and FutureIncident Response & Threat Intelligence
10:00 AM - 11:00 AME6. The Hunt: Using OSINT and Social Engineering to Get the InterviewSoft Skills
10:00 AM - 11:00 AME9. Living Security Virtual Escape Room 5Escape Room
11:15 AM - 12:15 PMF1. 5 Open Source Tools to Improve Application SecurityAppSec & DevSecOps
11:15 AM - 12:15 PMF2. Mapping the NIST CSF to AWS Security ServicesArchitecture & Operations
11:15 AM - 12:15 PMF3. One Privacy ProgramPrivacy
11:15 AM - 12:15 PMF4. Operational Technology (OT) Industry PanelEmerging Trends
11:15 AM - 12:15 PMF5. Defense on a Budget: Free TTPs for the Blue TeamIncident Response & Threat Intelligence
11:15 AM - 12:15 PMF6. Give to MeSecurity Management
11:15 AM - 12:15 PMF7. A Modern People-Centric Approach to Managing the Risk of Insider ThreatsVendor
11:15 AM - 12:15 PMF9. Living Security Virtual Escape Room 6Escape Room
12:15 PM - 12:30 PMClosing 

Living Security Escape Rooms have been a hit at our conferences. We are pleased to offer these options again this year, virtually!