Tentative AGENDA

Name Track Speakers More Info
7:30 AM - 8:00 AM
Buffet BreakfastSocial/Meal
7:30 AM - 7:00 PM
Registration OpenAdmin
8:00 AM - 9:00 AM
T1-2D. Visual Threat Intelligence – Unveil The Hidden GemsEmerging Trends
T1-3A. Decrypting the Cryptocurrency Criminal Ecosystem Incident Response & Threat Intelligence
T1-2A. Incident Response, Communications Plans, and Tabletop Exercises, Oh My!Incident Response & Threat Intelligence
T1-3B. The SEC and You: Understanding “Materiality”Risk & Compliance/Legislation
T1-3G. Apply Your Prior Experience(s) to Land a Job in InfoSecSoft Skills/Career Enhancement
T1-2H. Improving Data and Threat Awareness During a Cyber ResponseVendor
8:00 AM - 12:00 PM
Women In SecuritySpecial Event
8:15 AM - 12:15 PM
CISO Session Special Event
9:15 AM - 10:15 AM
T2-3A. How Hackers Are Using AI, and How to Stop Them AI
T2-2D. The Modern Family of CyberCriminalsEmerging Trends
T2-2A. Understanding how and when to work with federal law enforcementIncident Response & Threat Intelligence
T2-3B. Why Your Cybersecurity Budget is a Horse's AssRisk & Compliance/Legislation
T2-2B. Cybersecurity Program Success in the Face of Budget ConstraintsSecurity Management
T2-3G. Don’t Quit Your Day Job - How to THRIVE in Your Career Without Suffering BurnoutSoft Skills/Career Enhancement
T2-2H: Tier Zero: Applying Modern Security to Legacy Identities Vendor
10:15 AM - 10:45 AM
Refreshment BreakSocial/Meal
10:45 AM - 11:45 AM
T3-2D. Phishing-proof and Passwordless PleaseEmerging Trends
T3-2A. Adaptive Adversaries: The Evolution of Chinese Cyber EspionageIncident Response & Threat Intelligence
T3-3B. Coordinating Compliance: How to Leverage Frameworks and Maximize EfficienciesRisk & Compliance/Legislation
T3-2B. Master Situational Awareness to Optimize Material RiskSecurity Management
T3-3A. The Evolution Of A Security Program As The Business Moves From Datacenters To The Cloud & BeyondSecurity Stories/Lessons Learned/Case Studies
T3-3G. Life on a 5-Second Delay: Ethics Lessons Learned from Lifelong Hearing LossSoft Skills/Career Enhancement
T3-2H. A Return to FundamentalsVendor
12:00 PM - 1:00 PM
LunchSocial/Meal
12:30 PM - 1:30 PM
T4-3B. Engaging Your Senior Leadership on Cyber Risk ManagementRisk & Compliance/Legislation
T4-3A. Pre-grad Pwning - How I cracked an MSP at 17Security Stories/Lessons Learned/Case Studies
12:30 PM - 4:00 PM
Women In SecuritySpecial Event
12:45 PM - 3:45 PM
T4-2A. What To Do When It All Goes To Hell In A Hand-BasketIncident Response & Threat Intelligence
1:00 PM - 4:00 PM
T4-3G. Threat Modeling for Large Language ModelsAppSec & DevSecOps
T4-2H. Deconstructing AWS Intrusions: Attack, Detect, Defend LabIncident Response & Threat Intelligence
T4-2B. Governance of AI and Cybersecurity RiskSecurity Management
1:30 PM - 4:00 PM
SANS Executive Cybersecurity ExerciseSpecial Event
1:40 PM - 2:40 PM
T5-3B. CyberLegalese Decoded: Navigating SEC Reporting, Legal Risks, and Cybersecurity GovernanceRisk & Compliance/Legislation
T5-3A. Leadership Lessons Learned in CrisisSecurity Stories/Lessons Learned/Case Studies
2:45 PM - 3:00 PM
BreakSocial/Meal
3:00 PM - 4:00 PM
T6-3B. Hot Topics in Compliance - ISO 27001 VS. AICPA SOC 2Risk & Compliance/Legislation
T6-3A. Leadership, Cyber Security & the CISOSecurity Stories/Lessons Learned/Case Studies
4:00 PM - 4:30 PM
NetworkingSocial/Meal
4:30 PM - 5:30 PM
Opening Keynote with Rick Howard - Book Canon Award WinnerKeynote
5:30 PM - 7:30 PM
Welcome "Game Night" Reception and Job FairSocial/Meal
Name Track Speakers More Info
7:00 AM - 8:00 AM
Buffet Breakfast in the Exhibit HallSocial/Meal
7:00 AM - 4:30 PM
Registration OpenAdmin
8:00 AM - 9:00 AM
Morning Keynote Session with Ben HammersleyKeynote
9:00 AM - 9:15 AM
BreakSocial/Meal
9:15 AM - 10:15 AM
W1-2A. Evolution of threat intelligence, tracking your boss for fun, profit, and protectionIncident Response & Threat Intelligence
W1-2B. Human EDR: The Power of Training to Change the Narrative at Your EdgeSecurity Management
W1-2D. Quantum Reckoning: The Coming Day When Quantum Computers Breaks CryptographyEmerging Trends
W1-2G. Five Things DevOps Wants from InfoSecVendor
W1-3A. Real-Life Strategies for Governance, Risk, and Compliance with JIRA and Google WorkspaceSecurity Stories/Lessons Learned/Case Studies
W1-3B. Managing Third Party Risk as a Security ProfessionalRisk & Compliance/Legislation
W1-3D. Cyberpsychology and AIAI
W1-3F. The Self-Driving Enterprise: Google's Radical Vision for Transforming Security Operations with AI Vendor
W1-3G. Know Your Worth 2: Even Worthier - Exploring the 2023 Colorado Salary Survey ResultsSoft Skills/Career Enhancement
9:15 AM - 12:15 PM
SANS NETWARS CORE (Version 9) - Day 1Special Event
10:15 AM - 11:00 AM
Networking Break in Exhibit HallSocial/Meal
10:25 AM - 10:55 AM
EHP: A New Sheriff in Town - Regulation and Oversight of APIs is Upon Us (Not Just Banks) Exhibit Hall Presentation
Exhibit Hall PresentationsExhibit Hall Presentation
11:00 AM - 12:00 PM
W2-2A. First Aid Forensics: Investigating on a BudgetIncident Response & Threat Intelligence
W2-2B. Resolving Pain Points Within the CISO & Vendor RelationshipSecurity Management
W2-2F. Evaluating Vendor AI Claims: Cutting Through the HypeAppSec & DevSecOps
W2-2G. Enhancing Cybersecurity with Data Security Posture ManagementVendor
W2-3A. How AI is impacting Cyber Security and IT Team Operating ModelsSecurity Stories/Lessons Learned/Case Studies
W2-3B. Navigating Risk in the AI Storm of Today’s Digital LandscapeRisk & Compliance/Legislation
W2-3D. Machine Learning & AI Models, A New Frontier in CybersecurityAI
W2-3F. Win the Cyberwar with Zero TrustVendor
W2-3G. Mastering the Boardroom: Effective Communication Strategies for IT Security LeadersSoft Skills/Career Enhancement
12:00 PM - 1:15 PM
Lunch in Exhibit HallSocial/Meal
12:40 PM - 1:10 PM
EHP: Tactics, Techniques & Procedures of Advanced Attackers: Insights and Countermeasures Exhibit Hall Presentation
Exhibit Hall PresentationsExhibit Hall Presentation
1:15 PM - 2:15 PM
W3-2A. Highlights of the Red Canary 2024 Threat Detection Report Vendor
W3-2B. Cybersecurity Lessons from Jurassic ParkSecurity Management
W3-2D. Exploitable Weaknesses in GenAI Workflows: From RAG to RichesEmerging Trends
W3-2F. Making Security Fun Again: Building a Proactive Security CultureAppSec & DevSecOps
W3-2G. Best Practices for SASE: How Check Point is Accelerating Private and Internet AccessVendor
W3-3A. Managing Email Compromise and Wire Fraud IncidentsSecurity Stories/Lessons Learned/Case Studies
W3-3B. The Ripple Effects of SEC's Cyber Security Rule & Enforcement ActivityRisk & Compliance/Legislation
W3-3D. How is AI Impacting Privacy?AI
W3-3F. ISO 42001: An Introduction to the World’s First AI Certification (Part 1 of 2)AI
W3-3G. Your ’Future of Work” in Security: Next 10 Years Forecast and RoadmapSoft Skills/Career Enhancement
2:15 PM - 2:30 PM
BreakSocial/Meal
2:30 PM - 3:30 PM
W4-2A. Building Out a Cyber Threat Intelligence TeamIncident Response & Threat Intelligence
W4-2B. Enabling Automated Security Control Validation with Tommyknocker Open SourceSecurity Management
W4-2D. Deploy Identity-based Zero Trust, but Keep the Firewall!Emerging Trends
W4-2F. In the Pipe, 5x5: Copilots + Automated SecurityAppSec & DevSecOps
W4-3A. Consolidating Audits Doesn't Always Have to be Dante's Inferno: A Case StudySecurity Stories/Lessons Learned/Case Studies
W4-3B. Cybersecurity Maturity Model Certification (CMMC): It is finally here!!!Risk & Compliance/Legislation
W4-3D. Protecting AI From People & Protecting People From AIAI
W4-3F. Differential Privacy and Privacy LawPrivacy
3:30 PM - 4:15 PM
Networking Break in Exhibit HallSocial/Meal
3:40 PM - 4:10 PM
EHP: Understanding Risk and Threat Exhibit Hall Presentation
Exhibit Hall PresentationsExhibit Hall Presentation
4:15 PM - 5:00 PM
Afternoon Keynote Presentation with Dr. Jessica BarkerKeynote
Name Track Location Name Speakers More Info
7:00 AM - 8:00 AM
Buffet Breakfast in the Exhibit HallSocial/MealExhibit Hall D
7:00 AM - 12:00 PM
Registration OpenAdminBluebird Ballroom Prefunction
8:00 AM - 9:00 AM
Morning Keynote Session with Chris LapingKeynoteBluebird Ballroom 1ABC
9:00 AM - 9:45 AM
Networking Break in Exhibit HallSocial/MealExhibit Hall D
9:10 AM - 9:40 AM
EHP: You Can’t Protect What You Can’t See: Minimizing Your Attack Surface Exhibit Hall PresentationExhibit Hall Stage A
Exhibit Hall PresentationsExhibit Hall PresentationExhibit Hall D
9:15 AM - 10:15 AM
R1-3A. Hacking MFASecurity Stories/Lessons Learned/Case StudiesRoom 3A
R1-3B. Securing Tomorrow: Navigating the Impact of CMMC 2.0 on Department of Defense ContractorsRisk & Compliance/LegislationRoom 3BC
R1-3D. ISO 42001: Artificial Intelligence Framework Deep Dive (Part 2 of 2)AIRoom 3DE
R1-3G. U.S. Privacy Legislation: Why We’re Still Doing It WrongPrivacyRoom 3G
9:45 AM - 10:45 AM
R1-2A. Overcoming Cyber Threat Information Sharing Challenges: Too Much is at Stake in 2024Incident Response & Threat IntelligenceRoom 2A
R1-2B. AI: Fact, Fiction, and FrictionSecurity ManagementRoom 2BC
R1-2D. Continuous Threat Exposure Management / CTEMEmerging TrendsRoom 2DE
R1-2F. Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS ProjectAppSec & DevSecOpsRoom 2F
10:45 AM - 11:00 AM
BreakSocial/MealBluebird Ballroom Corridor
11:00 AM - 12:00 PM
R2-2A. Moving From a Controls-Based to an Intelligence-Driven Security ProgramIncident Response & Threat IntelligenceRoom 2A
R2-2B. Cloudy with a Chance of CyberattacksSecurity ManagementRoom 2BC
R2-2D. Navigating the Truth: AI and the Impact on Media IntegrityEmerging TrendsRoom 2DE
R2-2F. How to Use AppSec Testing as Part of an SSDLC to Prevent and Remediate Security VulnerabilitiesAppSec & DevSecOpsRoom 2F
R2-3A. Comedy in ComplianceSecurity Stories/Lessons Learned/Case StudiesRoom 3A
R2-3B. Be Aware, Get Prepared, Defend YourselfRisk & Compliance/LegislationRoom 3BC
R2-3D. The Future Coder Will Be An LLM (and it's not as bad as you think)AIRoom 3DE
R2-3G. Steps to a Secure Portfolio: Due Diligence During M&A & BeyondPrivacyRoom 3G
12:00 PM - 1:15 PM
Lunch in Exhibit HallSocial/MealExhibit Hall D
12:30 PM - 3:30 PM
SANS NETWARS CORE - Day 2Special EventRoom 2H
12:40 PM - 1:10 PM
EHP: Say Goodbye to Legacy SIEM and Hello to Modern Security Operations Exhibit Hall PresentationExhibit Hall Stage A
Exhibit Hall PresentationsExhibit Hall PresentationExhibit Hall D
1:15 PM - 2:15 PM
R3-2A. Fear and Loathing in the Board Room: A Hopeful Journey to SEC Compliance.Incident Response & Threat IntelligenceRoom 2A
R3-2B. Premiums to Payouts: Avoid Cyber Insurance Mistakes That Get Claims DeniedSecurity ManagementRoom 2BC
R3-2D. Information Assurance: The Next Chapter in IT AuditEmerging TrendsRoom 2DE
R3-2F. “Vulnerability Scanning Your Web Applications Is A Trap and What To Do Instead”AppSec & DevSecOpsRoom 2F
R3-3A. A CISO's Hiring Playbook: Proven Strategies for Building Great TeamsSecurity Stories/Lessons Learned/Case StudiesRoom 3A
R3-3D. Rite Aid's Facepalm: The FTC Settlement Resulting in a 5 Year Ban on Facial Recognition TechAIRoom 3DE
R3-3G. LinkedIn Unleashed: Strategies for Building a Personal Brand and Expanding Your NetworkSoft Skills/Career EnhancementRoom 3G
2:15 PM - 2:30 PM
BreakSocial/MealBluebird Ballroom Corridor
2:30 PM - 3:30 PM
R4-2A. Attracting Cloudy Bees with Honey CloudsIncident Response & Threat IntelligenceRoom 2A
R4-2B. Security Framework SoupSecurity ManagementRoom 2BC
R4-2D. Weaponizing Your Cybersecurity Program Using Technology TransformationEmerging TrendsRoom 2DE
R4-2F. Writing Secure Code == Writing Good CodeAppSec & DevSecOpsRoom 2F
R4-3A. A One Hit Wonder - A Ransomware JourneySecurity Stories/Lessons Learned/Case StudiesRoom 3A
R4-3B. Green Horizons: Navigating Sustainability with ISO 14001Risk & Compliance/LegislationRoom 3BC
R4-3D. Architecting Advanced Cybersecurity Programs with Snowflake Connected ApplicationsAIRoom 3DE
R4-3G. The Wave is Here - Impact of AI on Careers in CybersecuritySoft Skills/Career EnhancementRoom 3G
3:30 PM - 5:00 PM
Closing Keynote Session with Sean Swarner and Prize DrawingsKeynoteBluebird Ballroom 1ABC