7:00 AM - 8:00 AM |
Buffet Breakfast in the Exhibit Hall | Social/Meal | Exhibit Hall D | | |
7:00 AM - 12:00 PM |
Registration Open | Admin | Bluebird Ballroom Prefunction | | |
8:00 AM - 9:00 AM |
Morning Keynote Session with Chris Laping | Keynote | Bluebird Ballroom 1ABC | Chris Laping | |
9:00 AM - 9:45 AM |
Networking Break in Exhibit Hall | Social/Meal | Exhibit Hall D | | |
9:10 AM - 9:40 AM |
EHP: You Can’t Protect What You Can’t See: Minimizing Your Attack Surface | Exhibit Hall Presentation | Exhibit Hall Stage A | Alex Ruff - Trend Micro | |
Exhibit Hall Presentations | Exhibit Hall Presentation | Exhibit Hall D | | |
9:15 AM - 10:15 AM |
R1-3A. Hacking MFA | Security Stories/Lessons Learned/Case Studies | Room 3A | Roger Grimes - KnowBe4, Inc. | |
R1-3B. Securing Tomorrow: Navigating the Impact of CMMC 2.0 on Department of Defense Contractors | Risk & Compliance/Legislation | Room 3BC | Anders Erickson - Eide Bailly LLP | |
R1-3D. ISO 42001: Artificial Intelligence Framework Deep Dive (Part 2 of 2) | AI | Room 3DE | Christian Hyatt - risk3sixty Danny Manimbo - Schellman Joe Sigman - Schellman | |
R1-3G. U.S. Privacy Legislation: Why We’re Still Doing It Wrong | Privacy | Room 3G | Mike Pedrick - Nuspire | |
9:45 AM - 10:45 AM |
R1-2A. Overcoming Cyber Threat Information Sharing Challenges: Too Much is at Stake in 2024 | Incident Response & Threat Intelligence | Room 2A | Wayne Schepens - Cyber Risk Alliance Dave Stapleton - ProcessUnity | |
R1-2B. AI: Fact, Fiction, and Friction | Security Management | Room 2BC | Etay Maor - Cato Networks | |
R1-2D. Continuous Threat Exposure Management / CTEM | Emerging Trends | Room 2DE | Todd Felker - CrowdStrike | |
R1-2F. Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project | AppSec & DevSecOps | Room 2F | Brendan Hann - NowSecure | |
10:45 AM - 11:00 AM |
Break | Social/Meal | Bluebird Ballroom Corridor | | |
11:00 AM - 12:00 PM |
R2-2A. Moving From a Controls-Based to an Intelligence-Driven Security Program | Incident Response & Threat Intelligence | Room 2A | Randall Frietzsche - Denver Health | |
R2-2B. Cloudy with a Chance of Cyberattacks | Security Management | Room 2BC | Etay Maor - Cato Networks | |
R2-2D. Navigating the Truth: AI and the Impact on Media Integrity | Emerging Trends | Room 2DE | Patti Hallock - Trace3 | |
R2-2F. How to Use AppSec Testing as Part of an SSDLC to Prevent and Remediate Security Vulnerabilities | AppSec & DevSecOps | Room 2F | Paul Wowk - City National Bank | |
R2-3A. Comedy in Compliance | Security Stories/Lessons Learned/Case Studies | Room 3A | Paige Needling - Needling Worldwide, LLC | |
R2-3B. Be Aware, Get Prepared, Defend Yourself | Risk & Compliance/Legislation | Room 3BC | Michael Lines - Heuristic Security | |
R2-3D. The Future Coder Will Be An LLM (and it's not as bad as you think) | AI | Room 3DE | Greg Sternberg - Evotek | |
R2-3G. Steps to a Secure Portfolio: Due Diligence During M&A & Beyond | Privacy | Room 3G | Gina Yacone - Trace3 | |
12:00 PM - 1:15 PM |
Lunch in Exhibit Hall | Social/Meal | Exhibit Hall D | | |
12:30 PM - 3:30 PM |
SANS NETWARS CORE - Day 2 | Special Event | Room 2H | | |
12:40 PM - 1:10 PM |
EHP: Say Goodbye to Legacy SIEM and Hello to Modern Security Operations | Exhibit Hall Presentation | Exhibit Hall Stage A | Dave Herrald - Google Cloud | |
Exhibit Hall Presentations | Exhibit Hall Presentation | Exhibit Hall D | | |
1:15 PM - 2:15 PM |
R3-2A. Fear and Loathing in the Board Room: A Hopeful Journey to SEC Compliance. | Incident Response & Threat Intelligence | Room 2A | Douglas Brush - Brush Cyber | |
R3-2B. Premiums to Payouts: Avoid Cyber Insurance Mistakes That Get Claims Denied | Security Management | Room 2BC | Brandon Clark - Procern Technology Solutions | |
R3-2D. Information Assurance: The Next Chapter in IT Audit | Emerging Trends | Room 2DE | Angela Appleby - Plante Moran | |
R3-2F. “Vulnerability Scanning Your Web Applications Is A Trap and What To Do Instead” | AppSec & DevSecOps | Room 2F | Terry Bradley - Mile High Cyber | |
R3-3A. A CISO's Hiring Playbook: Proven Strategies for Building Great Teams | Security Stories/Lessons Learned/Case Studies | Room 3A | Jeff Combs - J. Combs Search Advisors | |
R3-3D. Rite Aid's Facepalm: The FTC Settlement Resulting in a 5 Year Ban on Facial Recognition Tech | AI | Room 3DE | Katie Butler - Torch Law LLC | |
R3-3G. LinkedIn Unleashed: Strategies for Building a Personal Brand and Expanding Your Network | Soft Skills/Career Enhancement | Room 3G | Cher Fox - Fox Consulting | |
2:15 PM - 2:30 PM |
Break | Social/Meal | Bluebird Ballroom Corridor | | |
2:30 PM - 3:30 PM |
R4-2A. Attracting Cloudy Bees with Honey Clouds | Incident Response & Threat Intelligence | Room 2A | Nathaniel Quist - Palo Alto Networks | |
R4-2B. Security Framework Soup | Security Management | Room 2BC | Daniel Perkins - SecurIT360 | |
R4-2D. Weaponizing Your Cybersecurity Program Using Technology Transformation | Emerging Trends | Room 2DE | Todd Bell - GlobalDataLock.com | |
R4-2F. Writing Secure Code == Writing Good Code | AppSec & DevSecOps | Room 2F | Christopher Clark - Documoto | |
R4-3A. A One Hit Wonder - A Ransomware Journey | Security Stories/Lessons Learned/Case Studies | Room 3A | Carlin Dornbusch - American Cyber Security Management Paul Herbka - American Cyber Security Management | |
R4-3B. Green Horizons: Navigating Sustainability with ISO 14001 | Risk & Compliance/Legislation | Room 3BC | Tom Andresen Gosselin - Schellman Nisha Ellis - Schellman Compliance, LLC. | |
R4-3D. Architecting Advanced Cybersecurity Programs with Snowflake Connected Applications | AI | Room 3DE | Matthew Sharp - Xactly | |
R4-3G. The Wave is Here - Impact of AI on Careers in Cybersecurity | Soft Skills/Career Enhancement | Room 3G | Brad Rager - Crux | |
3:30 PM - 5:00 PM |
Closing Keynote Session with Sean Swarner and Prize Drawings | Keynote | Bluebird Ballroom 1ABC | | |