Tentative AGENDA

Name Track Speakers More Info
8:00 AM - 9:00 AM
J4. Visual Threat Intelligence – Unveil The Hidden GemsEmerging Trends
J5. Decrypting the Cryptocurrency Criminal Ecosystem Incident Response & Threat Intelligence
J2. Incident Response, Communications Plans, and Tabletop Exercises, Oh My!Incident Response & Threat Intelligence
J3. The SEC and You: Understanding “Materiality”Risk & Compliance/Legislation
J1. Apply Your Prior Experience(s) to Land a Job in InfoSecSoft Skills/Career Enhancement
8:00 AM - 12:00 PM
Women In SecuritySpecial Event
8:30 AM - 12:30 PM
CISO Session Special Event
9:15 AM - 10:15 AM
K4. The Modern Family of CyberCriminalsEmerging Trends
K2. Understanding how and when to work with federal law enforcementIncident Response & Threat Intelligence
K3. Cybersecurity Program Success in the Face of Budget ConstraintsSecurity Management
K1. Don’t Quit Your Day Job - How to THRIVE in Your Career Without Suffering BurnoutSoft Skills/Career Enhancement
10:45 AM - 11:45 AM
L4. Phishing-proof and Passwordless PleaseEmerging Trends
L2. Adaptive Adversaries: The Evolution of Chinese Cyber EspionageIncident Response & Threat Intelligence
L3. Coordinating Compliance: How to Leverage Frameworks and Maximize EfficienciesRisk & Compliance/Legislation
L5. The Evolution Of A Security Program As The Business Moves From Datacenters To The Cloud & BeyondSecurity Stories/Lessons Learned/Case Studies
L1. Life on a 5-Second Delay: Ethics Lessons Learned from Lifelong Hearing LossSoft Skills/Career Enhancement
L6. Win the Cyberwar with Zero TrustVendor
12:30 PM - 1:30 PM
M3. Engaging Your Senior Leadership on Cyber Risk ManagementRisk & Compliance/Legislation
M5. Pre-grad Pwning - How I cracked an MSP at 17Security Stories/Lessons Learned/Case Studies
12:30 PM - 4:00 PM
Women In SecuritySpecial Event
1:00 PM - 4:00 PM
M4. Threat Modeling for Large Language ModelsAppSec & DevSecOps
M2. What To Do When It All Goes To Hell In A Hand-BasketIncident Response & Threat Intelligence
M1. Governance of AI and Cybersecurity RiskSecurity Management
1:30 PM - 4:00 PM
SANS Executive Cybersecurity ExerciseSpecial Event
1:40 PM - 2:40 PM
O3. CyberLegalese Decoded: Navigating SEC Reporting, Legal Risks, and Cybersecurity GovernanceRisk & Compliance/Legislation
N5. Leadership Lessons Learned in CrisisSecurity Stories/Lessons Learned/Case Studies
3:00 PM - 4:00 PM
N3. HOT TOPIC IN COMPLIANCE - ISO 27001 VS. AICPA SOC 2Risk & Compliance/Legislation
O5. Leadership, Cyber Security & the CISOSecurity Stories/Lessons Learned/Case Studies
Name Track Speakers More Info
9:15 AM - 10:15 AM
A1. Cyberpsychology and AIAI
A2. DevOps Security: Ensuring Continuous Protection in Software DevelopmentAppSec & DevSecOps
A4. Human EDR: The Power of Training to Change the Narrative at Your EdgeSecurity Management
A5. Real-Life Strategies for Governance, Risk, and Compliance with JIRA and Google WorkspaceSecurity Stories/Lessons Learned/Case Studies
A6. Managing Third Party Risk as a Security ProfessionalRisk & Compliance/Legislation
A8. Know Your Worth 2: Even Worthier - Exploring the 2023 Colorado Salary Survey ResultsSoft Skills/Career Enhancement
9:15 AM - 12:15 PM
SANS NETWARS CORE (Version 9) - Day 1Special Event
10:20 AM - 10:50 AM
A New Sheriff in Town - Regulation and Oversight of APIs is Upon Us (Not Just Banks) Exhibit Hall Presentation
11:00 AM - 12:00 PM
B1. Machine Learning & AI Models, A New Frontier in CybersecurityAI
B2. Evaluating Vendor AI Claims: Cutting Through the HypeAppSec & DevSecOps
B3. Recovering from the Blue Screen of Death: Aircraft Cybersecurity EditionEmerging Trends
B4. Resolving Pain Points Within the CISO & Vendor RelationshipSecurity Management
B5. How AI is impacting Cyber Security and IT Team Operating ModelsSecurity Stories/Lessons Learned/Case Studies
B6. Navigating Risk in the AI Storm of Today’s Digital LandscapeRisk & Compliance/Legislation
B7. First Aid Forensics: Investigating on a BudgetIncident Response & Threat Intelligence
B8. Mastering the Boardroom: Effective Communication Strategies for IT Security LeadersSoft Skills/Career Enhancement
Enhancing Cybersecurity with Data Posture Security Management Vendor
1:15 PM - 2:15 PM
Best Practices for SASE: How Check Point is Accelerating Private and Internet AccessVendor
C1. How is AI Impacting Privacy?AI
C2. Making Security Fun Again: Building a Proactive Security CultureAppSec & DevSecOps
C3. Exploitable Weaknesses in GenAI Workflows: From RAG to RichesEmerging Trends
C4. Cybersecurity Lessons from Jurassic ParkSecurity Management
C5. Managing Email Compromise and Wire Fraud IncidentsSecurity Stories/Lessons Learned/Case Studies
C6. The Ripple Effects of SEC's Cyber Security Rule & Enforcement ActivityRisk & Compliance/Legislation
C7. Deconstructing AWS Intrusions: Attack, Detect, Defend LabIncident Response & Threat Intelligence
C8. ISO 42001: An Introduction to the World’s First AI Certification (Part 1 of 2)Privacy
C8. Your ’Future of Work” in Security: Next 10 Years Forecast and RoadmapSoft Skills/Career Enhancement
2:30 PM - 3:30 PM
D1. Protecting AI From People & Protecting People From AIAI
D2. In the Pipe, 5x5: Copilots + Automated SecurityAppSec & DevSecOps
D3. Deploy Identity-based Zero Trust, but Keep the Firewall!Emerging Trends
D4. Enabling Automated Security Control Validation with Tommyknocker Open SourceSecurity Management
D5. Consolidating Audits Doesn't Always Have to be Dante's Inferno: A Case StudySecurity Stories/Lessons Learned/Case Studies
D6. Why Your Cybersecurity Budget is a Horse's AssRisk & Compliance/Legislation
D7. Building Out a Cyber Threat Intelligence TeamIncident Response & Threat Intelligence
D8. Differential Privacy and Privacy LawPrivacy
Name Track Location Name Speakers More Info
9:15 AM - 10:15 AM
E1. ISO 42001: Artificial Intelligence Framework Deep Dive (Part 2 of 2)AIRoom 2BC
E2. Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS ProjectAppSec & DevSecOpsRoom 2H
E3. Continuous Threat Exposure Management / CTEMEmerging TrendsRoom 2DE
E4. AI: Fact, Fiction, and FrictionSecurity ManagementRoom 2A
E5. Hacking MFASecurity Stories/Lessons Learned/Case StudiesRoom 3C
E6. Securing Tomorrow: Navigating the Impact of CMMC 2.0 on Department of Defense ContractorsRisk & Compliance/LegislationRoom 3DE
E7. Overcoming Cyber Threat Information Sharing Challenges: Too Much is at Stake in 2024Incident Response & Threat IntelligenceRoom 2F
E8. U.S. Privacy Legislation: Why We’re Still Doing It WrongPrivacyRoom 2G
11:00 AM - 12:00 PM
F1. The Future Coder Will Be An LLM (and it's not as bad as you think)AIRoom 2BC
F2. How to Use AppSec Testing as Part of an SSDLC to Prevent and Remediate Security VulnerabilitiesAppSec & DevSecOpsRoom 2H
F3. Navigating the Truth: AI and the Impact on Media IntegrityEmerging TrendsRoom 2DE
F4. Cloudy with a Chance of CyberattacksSecurity ManagementRoom 2A
F5. Comedy in ComplianceSecurity Stories/Lessons Learned/Case StudiesRoom 3C
F6. Be Aware, Get Prepared, Defend YourselfRisk & Compliance/LegislationRoom 3DE
F7. Moving From a Controls-Based to an Intelligence-Driven Security ProgramIncident Response & Threat IntelligenceRoom 2F
F8. Steps to a Secure Portfolio: Due Diligence During M&A & BeyondPrivacyRoom 2G
12:30 PM - 3:30 PM
SANS NETWARS CORE - Day 2Special EventRoom 3AB
1:15 PM - 2:15 PM
G1. Rite Aid's Facepalm: The FTC Settlement Resulting in a 5 Year Ban on Facial Recognition TechAIRoom 2BC
G2. “Vulnerability Scanning Your Web Applications Is A Trap and What To Do Instead”AppSec & DevSecOpsRoom 2H
G3. Information Assurance: The Next Chapter in IT AuditEmerging TrendsRoom 2DE
G4. Premiums to Payouts: Avoid Cyber Insurance Mistakes That Get Claims DeniedSecurity ManagementRoom 2A
G5. A CISO's Hiring Playbook: Proven Strategies for Building Great TeamsSecurity Stories/Lessons Learned/Case StudiesRoom 3C
G6. LinkedIn Unleashed: Strategies for Building a Personal Brand and Expanding Your NetworkSoft Skills/Career EnhancementRoom 2G
G7. Fear and Loathing in the Board Room: A Hopeful Journey to SEC Compliance.Incident Response & Threat IntelligenceRoom 2F
2:30 PM - 3:30 PM
F8. Green Horizons: Navigating Sustainability with ISO 14001Risk & Compliance/LegislationRoom 3DE
H1. Architecting Advanced Cybersecurity Programs with Snowflake Connected ApplicationsAIRoom 2BC
H2. Writing Secure Code == Writing Good CodeAppSec & DevSecOpsRoom 2H
H3. Weaponizing Your Cybersecurity Program Using Technology TransformationEmerging TrendsRoom 2DE
H4. Security Framework SoupSecurity ManagementRoom 2A
H5. A One Hit Wonder - A Ransomware JourneySecurity Stories/Lessons Learned/Case StudiesRoom 3C
H6. The Wave is Here - Impact of AI on Careers in CybersecuritySoft Skills/Career EnhancementRoom 2G
H7. Attracting Cloudy Bees with Honey CloudsIncident Response & Threat IntelligenceRoom 2F