8:00 AM - 9:00 AM |
Keynote: Cybersecurity First Principles | Keynote | Mile High Ballroom 3/4 | Rick Howard - The CyberWire | |
9:15 AM - 10:15 AM |
A1: Adding Continuous Inspection to Your CI/CD Pipelines with Build Inspector Open Source | AppSec & DevSecOps | Room 401/402 | Jeremy Banker - VMware | |
B1: Robbing a Bank Over the Phone-How an Expert Social Engineer Can Convince You to Do Anything | Incident Response & Threat Intelligence | Room 405/406 | Joshua Crumbaugh - PhishFirewall | |
C1: National CISO Panel | Leadership | Room 403/404 | James Johnson - Holland & Hart Joseph McComb - Holland & Hart Michelle Wilson - Movement Mortgage Tim Coogan - Colorado Regional Transportation District Daniel Ayala - Dotmatics | |
D1: Beyond Compliance – Leverage Your Next Risk Assessment for Program Improvement | Risk & Compliance/Legislation | Room 501/502 | Doug Landoll - Lantego | |
E1: Complexity is the Enemy of Security – Take it Out | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Steve Winterfeld - Akamai | |
F1: Cyber Resiliency... New Rules. New Tools. | Resiliency | Room 506 | Paige Needling - Needling Worldwide, LLC | |
G1: Cultivating Developer Security Adoption | Sponsored | Room 407 | John Burke - Snyk Anthony Sayre - Snyk | |
H1: 40 Years in 40 Minutes - A Journey Through Cyber... | Sponsored | Room 505 | Grant Asplund - Check Point Software | |
10:25 AM - 10:55 AM |
SA1: Introduction to Kubernetes Runtime Threat Detection | Sponsored | Exhibit Hall Stage A | Dan Schwarz - Sysdig | |
SB1: Security Validation as the Heart of Exposure Management | Sponsored | Exhibit Hall Stage B | Jason Mar-Tang - Pentera | |
11:00 AM - 12:00 PM |
A2: Mythbusting OWASP's Insecure Design | AppSec & DevSecOps | Room 401/402 | Joe Gerber - SecurityPatterns.net | |
B2: Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate and Engage | Incident Response & Threat Intelligence | Room 405/406 | Michael-Angelo Zummo - Cybersixgill | |
C2: Federal Cyber Resource Panel | Risk & Compliance/Legislation | Room 403/404 | Steve Winterfeld - Akamai Dave Sonheim - DHS/CISA Matt Closson - Homeland Security Investigations Edward Marmon - CISA | |
D2: Rise of the Machines: The Coming Wave of Data Breach and Privacy Litigation | Risk & Compliance/Legislation | Room 501/502 | Douglas Brush - Accel Consulting Paul Karlsgodt - Baker & Hostetler LLP | |
E2: From The Trenches - A CSOs Guide To Legal Privilege | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Lee Vorthman - Oracle | |
F2: Exercise Hacking Industrial IOT | Resiliency | Room 506 | Jesus Garcia - rthreat | |
G2: Data Security and Governance – Modernizing Strategic Vision and Execution | Sponsored | Room 407 | Jacob Rubin - EVOTEK Gaurav Chander - Thales | |
H2: What Would Charlotte Do? How to Leverage the Latest Threat Intel to Mature Your Security Program | Sponsored | Room 505 | Todd Felker - CrowdStrike | |
12:45 PM - 1:15 PM |
SA2: TPR Trivia – What Do You Know? Dealing with the Daily Churn | Sponsored | Exhibit Hall Stage A | Damien Sigman - Optiv Mike Spess - Bitsight | |
SB2: The Modern API Security Strategy – What’s Next? | Sponsored | Exhibit Hall Stage B | Karl Mattson - Noname Security | |
1:30 PM - 2:30 PM |
A3: Harnessing the Swarm: What a Mature Bug Bounty Program Teaches Us | AppSec & DevSecOps | Room 401/402 | Tate Crumbley - Slack | |
B3: Incident Response – How To Give the Advantage to the Hackers! | Incident Response & Threat Intelligence | Room 405/406 | James Christiansen - Netskope | |
C3: Kinetic Cyber Effects for the Win! | Emerging Trends - Threat & Technology | Room 403/404 | Brad Rhodes - Accenture Federal Services | |
D3: DNT, GPC, and UOOM Walk Into Bar… | Risk & Compliance/Legislation | Room 501/502 | Chelsea Kelleher - Michael Best & Friedrich LLP Jason Cronk - Enterprivacy Consulting Group Janelle Hsia - Privacy SWAN Consulting | |
E3: Transform Cybersecurity with the Power of AI | Security Stories/Lessons Learned/Case Studies | Room 503/504 | Laura Harder - VMware, 53d NOS, ISSA International Board of Directors | |
F3: It’s a Snap Securing Your Multi-Cloud, Cloud-Native Deployments with CNAPP | Security Management | Room 506 | Grant Asplund - Check Point Software | |
G3: A New Era for IT and Cyber Security Professionals | Sponsored | Room 407 | Craig Pfister - Kiteworks | |
H3: What is this thing? Responding to supply chain attacks: A 3CX Highlight | Sponsored | Room 505 | Charisa Persico - Red Canary | |
2:45 PM - 3:45 PM |
A4: AppSec Testing: Start Left to Stay Ahead | AppSec & DevSecOps | Room 401/402 | Gad Bashvitz - Bright | |
B4: Unleash Your Inner Terminator: Using ChatGPT to Create Epic Tabletop Scenarios and Runbooks | Incident Response & Threat Intelligence | Room 405/406 | Tara Miller - Uplight Stephen Edmonds - Uplight | |
C4: Hybrid Workforce: The Truth Behind Your Malvertising Risk | Emerging Trends - Threat & Technology | Room 403/404 | Chris Olson - The Media Trust | |
D4: Untangling the Web of Federal Assessments | Risk & Compliance/Legislation | Room 501/502 | Marci Womack - Schellman | |
E4: Developing a Better Way to Measure Cyber Security Efforts | Security Management | Room 503/504 | Justin Jetton - VSO | |
F4: Passwords—Take the Red Pill | Emerging Trends - Threat & Technology | Room 506 | Hoyt L Kesterson II - CNC Consulting Daniel Giebink - Avertium | |
G4: The Indispensable Human Element in Cybersecurity | Sponsored | Room 407 | Michael Leland - SentinelOne | |
H4: The Business Value & ROI of Zero Trust | Sponsored | Room 505 | Brett James - Zscaler | |
3:45 PM - 4:15 PM |
SA3: Mission SIEMPossible: From Legacy SIEM to Detection-as-Code | Sponsored | Exhibit Hall Stage A | Ken Westin - Panther | |
SB3: Today's Attacks Deserve Better. Stop Using Yesterday's Strategies | Sponsored | Exhibit Hall Stage B | Den Jones - Banyan Security | |
4:15 PM - 5:00 PM |
Keynote: John Strand Yells at Cloud | Keynote | Mile High Ballroom 3/4 | John Strand - Bhis | |