Tentative AGENDA

Name Track Location Name Speakers More Info
8:00 AM - 12:00 PM
Women in SecurityEmerging TrendsRoom 505
InfraGard: Protecting Critical InfrastructureIncident Response & Threat IntelligenceRoom 407
Alteryx Exploration WorkshopOtherRoom 406
Privacy ForumPrivacyRoom 401/402/403
CMMC: DoD's 3rd Party Supply Chain Risk Management ProgramRisk & Compliance/LegislationRoom 504
Your Qualitative Risk Management is BrokenSecurity ManagementRoom 506
8:00 AM - 4:00 PM
Dark Web Investigations WorkshopEmerging Trends - Threat & TechnologyRoom 501/502
RMISC Security Leader UnconferenceLeadershipRoom 405
1:00 PM - 2:30 PM
Careers in Cybersecurity: Trends, Challenges and Opportunities (COMM)Career Enhancement/Personal DevelopmentRoom 503
1:00 PM - 4:00 PM
Building the Bridge from Cybersecurity Education to Employment (COMM)Career Enhancement/Personal DevelopmentRoom 506
Strategies for Creating a Cybersecurity Career: For Newcomers, Career Changers, or Stale Jobs (COMM)Career Enhancement/Personal DevelopmentRoom 504
Women in Security (COMM)Career Enhancement/Personal DevelopmentRoom 505
Alteryx Exploration Workshop (COMM)OtherRoom 406
Privacy Forum Afternoon Track #2 (COMM) PrivacyRoom 403
Privacy Forum Afternoon Track #1 (COMM)PrivacyRoom 401/402
Secure Access Service Edge (SASE) with Prisma SD-WAN (COMM)SponsoredRoom 407
2:30 PM - 4:00 PM
The Art of Service (COMM)Career Enhancement/Personal DevelopmentRoom 503
4:30 PM - 5:30 PM
Keynote: CISO SERIES Live Podcast Recording (COMM)KeynoteMile High Ballroom 3/4

(COMM) indicates the session is open to the public as part of our half-day Community Sessions.

Name Track Location Name Speakers More Info
8:00 AM - 9:00 AM
Keynote: Cybersecurity First PrinciplesKeynoteMile High Ballroom 3/4
9:15 AM - 10:15 AM
A1: Adding Continuous Inspection to Your CI/CD Pipelines with Build Inspector Open SourceAppSec & DevSecOpsRoom 401/402
B1: Robbing a Bank Over the Phone-How an Expert Social Engineer Can Convince You to Do AnythingIncident Response & Threat IntelligenceRoom 405/406
C1: National CISO PanelLeadershipRoom 403/404
D1: Beyond Compliance – Leverage Your Next Risk Assessment for Program ImprovementRisk & Compliance/LegislationRoom 501/502
E1: Complexity is the Enemy of Security – Take it OutSecurity Stories/Lessons Learned/Case StudiesRoom 503/504
F1: Cyber Resiliency... New Rules. New Tools.ResiliencyRoom 506
G1: Cultivating Developer Security AdoptionSponsoredRoom 407
H1: 40 Years in 40 Minutes - A Journey Through Cyber...SponsoredRoom 505
10:25 AM - 10:55 AM
SA1: Introduction to Kubernetes Runtime Threat DetectionSponsoredExhibit Hall Stage A
SB1: Security Validation as the Heart of Exposure ManagementSponsoredExhibit Hall Stage B
11:00 AM - 12:00 PM
A2: Mythbusting OWASP's Insecure DesignAppSec & DevSecOpsRoom 401/402
B2: Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate and EngageIncident Response & Threat IntelligenceRoom 405/406
C2: Federal Cyber Resource Panel Risk & Compliance/LegislationRoom 403/404
D2: Rise of the Machines: The Coming Wave of Data Breach and Privacy LitigationRisk & Compliance/LegislationRoom 501/502
E2: From The Trenches - A CSOs Guide To Legal PrivilegeSecurity Stories/Lessons Learned/Case StudiesRoom 503/504
F2: Exercise Hacking Industrial IOTResiliencyRoom 506
G2: Data Security and Governance – Modernizing Strategic Vision and Execution SponsoredRoom 407
H2: What Would Charlotte Do? How to Leverage the Latest Threat Intel to Mature Your Security ProgramSponsoredRoom 505
12:45 PM - 1:15 PM
SA2: TPR Trivia – What Do You Know? Dealing with the Daily ChurnSponsoredExhibit Hall Stage A
SB2: The Modern API Security Strategy – What’s Next?SponsoredExhibit Hall Stage B
1:30 PM - 2:30 PM
A3: Harnessing the Swarm: What a Mature Bug Bounty Program Teaches UsAppSec & DevSecOpsRoom 401/402
B3: Incident Response – How To Give the Advantage to the Hackers!Incident Response & Threat IntelligenceRoom 405/406
C3: Kinetic Cyber Effects for the Win!Emerging Trends - Threat & TechnologyRoom 403/404
D3: DNT, GPC, and UOOM Walk Into Bar…Risk & Compliance/LegislationRoom 501/502
E3: Transform Cybersecurity with the Power of AISecurity Stories/Lessons Learned/Case StudiesRoom 503/504
F3: It’s a Snap Securing Your Multi-Cloud, Cloud-Native Deployments with CNAPPSecurity ManagementRoom 506
G3: A New Era for IT and Cyber Security ProfessionalsSponsoredRoom 407
H3: What is this thing? Responding to supply chain attacks: A 3CX HighlightSponsoredRoom 505
2:45 PM - 3:45 PM
A4: AppSec Testing: Start Left to Stay AheadAppSec & DevSecOpsRoom 401/402
B4: Unleash Your Inner Terminator: Using ChatGPT to Create Epic Tabletop Scenarios and RunbooksIncident Response & Threat IntelligenceRoom 405/406
C4: Hybrid Workforce: The Truth Behind Your Malvertising RiskEmerging Trends - Threat & TechnologyRoom 403/404
D4: Untangling the Web of Federal AssessmentsRisk & Compliance/LegislationRoom 501/502
E4: Developing a Better Way to Measure Cyber Security EffortsSecurity ManagementRoom 503/504
F4: Passwords—Take the Red PillEmerging Trends - Threat & TechnologyRoom 506
G4: The Indispensable Human Element in CybersecuritySponsoredRoom 407
H4: The Business Value & ROI of Zero TrustSponsoredRoom 505
3:45 PM - 4:15 PM
SA3: Mission SIEMPossible: From Legacy SIEM to Detection-as-CodeSponsoredExhibit Hall Stage A
SB3: Today's Attacks Deserve Better. Stop Using Yesterday's StrategiesSponsoredExhibit Hall Stage B
4:15 PM - 5:00 PM
Keynote: John Strand Yells at CloudKeynoteMile High Ballroom 3/4
Name Track Location Name Speakers More Info
8:00 AM - 9:00 AM
Keynote: The Power of Generative AI and GPT: Augmenting Human Capabilities to Compete and Move at the Pace of RelevanceKeynoteMile High Ballroom 3/4
9:00 AM - 9:30 AM
SA4: Get Real About Threat Response: Stop Talking It & Start Building ItSponsoredExhibit Hall Stage A
SB4: Insights into Today’s Top Cyber Security Trends and Attacks SponsoredExhibit Hall Stage B
9:30 AM - 10:30 AM
A5: Why WireGuard and OAuth2 Proxy Should Be In Your 2023 Cybersecurity Tool BeltArchitecture & OperationsRoom 401/402
B5: If It Qaks Like a Duck: Decoding Qakbot’s Behavior and C2 MessagingIncident Response & Threat IntelligenceRoom 405/406
C5: Optimize Your Information Security and Data Privacy Program with the ISO 27000 Family of StandardsRisk & Compliance/LegislationRoom 403/404
D5: Maintaining Cyber and Business Resilience in a Turbulent WorldCareer Enhancement/Personal DevelopmentRoom 501/502
E5: API Security: A CISO PerspectiveSecurity ManagementRoom 503/504
F5: What Gets Measured Gets Done: Crafting Security Program Metrics You AND Your Boss Care AboutSecurity ManagementRoom 506
G5: CNAPP in the WWW – Proactive Protection in the Wild Wild West of the CloudSponsoredRoom 407
H5: New Player in the Cyber Security Team – Data Protection Room 505
10:45 AM - 11:45 AM
A6: IoT Vulnerability Management - A PlaybookArchitecture & OperationsRoom 401/402
B6: Incident Response 1, 2, 3 – Combat Ransomware with the MS-ISACIncident Response & Threat IntelligenceRoom 405/406
C6: From the Server Room to the Board Room LeadershipRoom 403/404
D6: Talent Retention Amidst Quiet Quitting and The Great ResignationCareer Enhancement/Personal DevelopmentRoom 501/502
E6: Visibility is not Just a Buzz WordIncident Response & Threat IntelligenceRoom 503/504
F6: Rise of the Pen Testing Machines: Is Resistance Futile?Security ManagementRoom 506
G6: Insane in the Membrane: Why Old Tactics Fail for Ransomware Prevention and How Post-Infection Remediation Can Save Your SOC Team’s SanitySponsoredRoom 407
H6: Prius vs. Ferrari: Who’s Helping Threat Actors Outpace Security Controls?SponsoredRoom 505
12:35 PM - 1:05 PM
SA5: Anatomy of a Disaster: Why We’re Still Losing to RansomwareSponsoredExhibit Hall Stage A
SB5: Why Addressing Network Latency Is Paramount SponsoredExhibit Hall Stage B
1:30 PM - 2:30 PM
A7: CancelledArchitecture & OperationsRoom 401/402
B7: Don’t Fear The Hacking (tools)Incident Response & Threat IntelligenceRoom 405/406
C7: The API Security Landscape and What We Have Seen This YearEmerging Trends - Threat & TechnologyRoom 403/404
D7: 1% Leadership: Building Your Leadership PracticeCareer Enhancement/Personal DevelopmentRoom 501/502
E7: Tackling Third-Party Risk in an Outsourced WorldThird Party & InsiderRoom 503/504
F7: Penetration Testing For NOT DummiesSecurity ManagementRoom 506
2:45 PM - 3:45 PM
A8: Automating Security Operations and BeyondArchitecture & OperationsRoom 401/402
B8: Preventing Control Failures To Assuredly Defend Global InfrastructureIncident Response & Threat IntelligenceRoom 405/406
C8: Preparing for the Next Era of RansomwareEmerging Trends - Threat & TechnologyRoom 403/404
D8: What’s Your Worth? Lessons From the 2023 Colorado=Security Salary SurveyCareer Enhancement/Personal DevelopmentRoom 501/502
E8: What It and It Security Teams Look For in Vendor RelationshipsThird Party & InsiderRoom 503/504
F8: Do We Speak the Same Language?: It’s Time We Talk in Dollars and Cents, Not Just Bits and BytesSecurity ManagementRoom 506
4:00 PM - 5:00 PM
Closing Keynote with Nina Sossamon-Pogue, THIS is 'Resilience'KeynoteMile High Ballroom 3/4