9:15 AM - 10:15 AM |
E1. ISO 42001: Artificial Intelligence Framework Deep Dive (Part 2 of 2) | AI | Room 2BC | Christian Hyatt - risk3sixty Danny Manimbo - Schellman Joe Sigman - Schellman | |
E2. Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project | AppSec & DevSecOps | Room 2H | Brendan Hann - NowSecure | |
E3. Continuous Threat Exposure Management / CTEM | Emerging Trends | Room 2DE | Todd Felker - CrowdStrike | |
E4. AI: Fact, Fiction, and Friction | Security Management | Room 2A | Kevin Petschow - Cato Networks | |
E5. Hacking MFA | Security Stories/Lessons Learned/Case Studies | Room 3C | Roger Grimes - KnowBe4, Inc. | |
E6. Securing Tomorrow: Navigating the Impact of CMMC 2.0 on Department of Defense Contractors | Risk & Compliance/Legislation | Room 3DE | Anders Erickson - Eide Bailly LLP | |
E7. Overcoming Cyber Threat Information Sharing Challenges: Too Much is at Stake in 2024 | Incident Response & Threat Intelligence | Room 2F | Wayne Schepens - Cyber Risk Alliance Chris Anthony - TeamWorx Security | |
E8. U.S. Privacy Legislation: Why We’re Still Doing It Wrong | Privacy | Room 2G | Mike Pedrick - Nuspire | |
11:00 AM - 12:00 PM |
F1. The Future Coder Will Be An LLM (and it's not as bad as you think) | AI | Room 2BC | | |
F2. How to Use AppSec Testing as Part of an SSDLC to Prevent and Remediate Security Vulnerabilities | AppSec & DevSecOps | Room 2H | Paul Wowk - City National Bank | |
F3. Navigating the Truth: AI and the Impact on Media Integrity | Emerging Trends | Room 2DE | Patti Hallock - Independent | |
F4. Cloudy with a Chance of Cyberattacks | Security Management | Room 2A | Etay Maor - Cato Networks | |
F5. Comedy in Compliance | Security Stories/Lessons Learned/Case Studies | Room 3C | Paige Needling - Needling Worldwide, LLC | |
F6. Be Aware, Get Prepared, Defend Yourself | Risk & Compliance/Legislation | Room 3DE | Michael Lines - Heuristic Security | |
F7. Moving From a Controls-Based to an Intelligence-Driven Security Program | Incident Response & Threat Intelligence | Room 2F | Randall Frietzsche - Denver Health | |
F8. Steps to a Secure Portfolio: Due Diligence During M&A & Beyond | Privacy | Room 2G | Gina Yacone - Trace3 | |
12:30 PM - 3:30 PM |
SANS NETWARS CORE - Day 2 | Special Event | Room 3AB | | |
1:15 PM - 2:15 PM |
G1. Rite Aid's Facepalm: The FTC Settlement Resulting in a 5 Year Ban on Facial Recognition Tech | AI | Room 2BC | Katie Butler - Torch Law LLC | |
G2. “Vulnerability Scanning Your Web Applications Is A Trap and What To Do Instead” | AppSec & DevSecOps | Room 2H | Terry Bradley - Mile High Cyber | |
G3. Information Assurance: The Next Chapter in IT Audit | Emerging Trends | Room 2DE | Angela Appleby - Plante Moran | |
G4. Premiums to Payouts: Avoid Cyber Insurance Mistakes That Get Claims Denied | Security Management | Room 2A | Brandon Clark - Procern Technology Solutions | |
G5. A CISO's Hiring Playbook: Proven Strategies for Building Great Teams | Security Stories/Lessons Learned/Case Studies | Room 3C | Jeff Combs - J. Combs Search Advisors | |
G6. LinkedIn Unleashed: Strategies for Building a Personal Brand and Expanding Your Network | Soft Skills/Career Enhancement | Room 2G | Cher Fox - Fox Consulting | |
G7. Fear and Loathing in the Board Room: A Hopeful Journey to SEC Compliance. | Incident Response & Threat Intelligence | Room 2F | Douglas Brush - Accel Consulting, LLC | |
2:30 PM - 3:30 PM |
F8. Green Horizons: Navigating Sustainability with ISO 14001 | Risk & Compliance/Legislation | Room 3DE | Tom Andresen Gosselin - Schellman | |
H1. Architecting Advanced Cybersecurity Programs with Snowflake Connected Applications | AI | Room 2BC | Matthew Sharp - Xactly | |
H2. Writing Secure Code == Writing Good Code | AppSec & DevSecOps | Room 2H | Christopher Clark - Documoto | |
H3. Weaponizing Your Cybersecurity Program Using Technology Transformation | Emerging Trends | Room 2DE | Todd Bell - GlobalDataLock.com | |
H4. Security Framework Soup | Security Management | Room 2A | Daniel Perkins - SecurIT360 | |
H5. A One Hit Wonder - A Ransomware Journey | Security Stories/Lessons Learned/Case Studies | Room 3C | Carlin Dornbusch - American Cyber Security Management Paul Herbka - American Cyber Security Management | |
H6. The Wave is Here - Impact of AI on Careers in Cybersecurity | Soft Skills/Career Enhancement | Room 2G | Brad Rager - Crux | |
H7. Attracting Cloudy Bees with Honey Clouds | Incident Response & Threat Intelligence | Room 2F | Nathaniel Quist - Palo Alto Networks | |