8:00 AM - 9:00 AM |
Keynote: Cybersecurity First Principles | Keynote | Mile High Ballroom 3/4 | Rick Howard - The CyberWire
| |
9:15 AM - 10:15 AM |
A1: Adding Continuous Inspection to Your CI/CD Pipelines with Build Inspector Open Source | AppSec & DevSecOps | Room 401/402 | Jeremy Banker - VMware
| |
B1: Robbing a Bank Over the Phone-How an Expert Social Engineer Can Convince You to Do Anything | Incident Response & Threat Intelligence | Room 405/406 | Joshua Crumbaugh - PhishFirewall
| |
C1: National CISO Panel | Leadership | Room 403/404 | James Johnson - Holland & Hart Joseph McComb - Holland & Hart Michelle Wilson - Movement Mortgage Tim Coogan - Colorado Regional Transportation District Daniel Ayala - Dotmatics
| |
D1: Beyond Compliance – Leverage Your Next Risk Assessment for Program Improvement | Risk & Compliance/Legislation | Room 501/502 | Doug Landoll - Lantego
| |
E1: Complexity is the Enemy of Security – Take it Out | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Steve Winterfeld - Akamai
| |
F1: Cyber Resiliency... New Rules. New Tools. | Resiliency | Room 506 | Paige Needling - Needling Worldwide, LLC
| |
G1: Cultivating Developer Security Adoption | Sponsored | Room 407 | John Burke - Snyk Anthony Sayre - Snyk
| |
H1: 40 Years in 40 Minutes - A Journey Through Cyber... | Sponsored | Room 505 | Grant Asplund - Check Point Software
| |
10:25 AM - 10:55 AM |
SA1: Introduction to Kubernetes Runtime Threat Detection | Sponsored | Exhibit Hall Stage A | Daniel Schwarz - Sysdig
| |
SB1: Security Validation as the Heart of Exposure Management | Sponsored | Exhibit Hall Stage B | Jason Mar-Tang - Pentera
| |
11:00 AM - 12:00 PM |
A2: Mythbusting OWASP's Insecure Design | AppSec & DevSecOps | Room 401/402 | Joe Gerber - SecurityPatterns.net
| |
B2: Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate and Engage | Incident Response & Threat Intelligence | Room 405/406 | Michael-Angelo Zummo - Cybersixgill
| |
C2: Federal Cyber Resource Panel | Risk & Compliance/Legislation | Room 403/404 | Steve Winterfeld - Akamai Dave Sonheim - DHS/CISA Matt Closson - Homeland Security Investigations Edward Marmon - CISA
| |
D2: Rise of the Machines: The Coming Wave of Data Breach and Privacy Litigation | Risk & Compliance/Legislation | Room 501/502 | Douglas Brush - Accel Consulting
| |
E2: From The Trenches - A CSOs Guide To Legal Privilege | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Lee Vorthman - Oracle
| |
F2: Exercise Hacking Industrial IOT | Resiliency | Room 506 | Jesus Garcia - rthreat
| |
G2: Data Security and Governance – Modernizing Strategic Vision and Execution | Sponsored | Room 407 | Jacob Rubin - EVOTEK Gaurav Chander - Thales
| |
H2: What Would Charlotte Do? How to Leverage the Latest Threat Intel to Mature Your Security Program | Sponsored | Room 505 | Todd Felker - CrowdStrike
| |
12:45 PM - 1:15 PM |
SA2: TPR Trivia – What Do You Know? Dealing with the Daily Churn | Sponsored | Exhibit Hall Stage A | James Bundy - Optiv Mike Spess - Bitsight
| |
SB2: The Modern API Security Strategy – What’s Next? | Sponsored | Exhibit Hall Stage B | Karl Mattson - Noname Security
| |
1:30 PM - 2:30 PM |
A3: Harnessing the Swarm: What a Mature Bug Bounty Program Teaches Us | AppSec & DevSecOps | Room 401/402 | Tate Crumbley - Slack
| |
B3: Incident Response – How To Give the Advantage to the Hackers! | Incident Response & Threat Intelligence | Room 405/406 | James Christiansen - Netskope
| |
C3: Kinetic Cyber Effects for the Win! | Emerging Trends - Threat & Technology | Room 403/404 | Brad Rhodes - Accenture Federal Services
| |
D3: DNT, GPC, and UOOM Walk Into Bar… | Risk & Compliance/Legislation | Room 501/502 | Chelsea Kelleher - Michael Best & Friedrich LLP Jason Cronk - Enterprivacy Consulting Group Janelle Hsia - Privacy SWAN Consulting
| |
E3: Transform Cybersecurity with the Power of AI | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Laura Harder - VMware, 53d NOS, ISSA International Board of Directors
| |
F3: It’s a Snap Securing Your Multi-Cloud, Cloud-Native Deployments with CNAPP | Security Management | Room 506 | Grant Asplund - Check Point Software
| |
G3: A New Era for IT and Cyber Security Professionals | Sponsored | Room 407 | Craig Pfister - Kiteworks
| |
H3: What is this thing? Responding to supply chain attacks: A 3CX Highlight | Sponsored | Room 505 | Charisa Persico - Red Canary
| |
2:45 PM - 3:45 PM |
A4: AppSec Testing: Start Left to Stay Ahead | AppSec & DevSecOps | Room 401/402 | Gad Bashvitz - Bright
| |
B4: Unleash Your Inner Terminator: Using ChatGPT to Create Epic Tabletop Scenarios and Runbooks | Incident Response & Threat Intelligence | Room 405/406 | Tara Miller - Uplight Stephen Edmonds - Uplight
| |
C4: Hybrid Workforce: The Truth Behind Your Malvertising Risk | Emerging Trends - Threat & Technology | Room 403/404 | Chris Olson - The Media Trust
| |
D4: Untangling the Web of Federal Assessments | Risk & Compliance/Legislation | Room 501/502 | Marci Womack - Schellman
| |
E4: Developing a Better Way to Measure Cyber Security Efforts | Security Management | Room 503/504 | Justin Jetton - VSO
| |
F4: Passwords—Take the Red Pill | Emerging Trends - Threat & Technology | Room 506 | Hoyt L Kesterson II - CNC Consulting Daniel Giebink - Avertium
| |
G4: The Indispensable Human Element in Cybersecurity | Sponsored | Room 407 | Michael Leland - SentinelOne
| |
H4: The Business Value & ROI of Zero Trust | Sponsored | Room 505 | Brett James - Zscaler
| |
3:45 PM - 4:15 PM |
SA3: Mission SIEMPossible: From Legacy SIEM to Detection-as-Code | Sponsored | Exhibit Hall Stage A | Ken Westin - Panther
| |
SB3: Today's Attacks Deserve Better. Stop Using Yesterday's Strategies | Sponsored | Exhibit Hall Stage B | Den Jones - Banyan Security
| |
4:15 PM - 5:00 PM |
Keynote: John Strand Yells at Cloud | Keynote | Mile High Ballroom 3/4 | John Strand - Black Hills Information Security
| |