Tentative schedule — subject to change.
Start
End
7:30 am
8:30 am
Registration
7:30 am - 8:30 am
8:00 am
8:30 am
Breakfast
8:00 am - 8:30 am
8:30 am
8:40 am
Introductions
8:30 am - 8:40 am
Grand Lilac Ballroom
8:40 am
9:40 am
Keynote - Moses Frost
8:40 am - 9:40 am
Grand Lilac Ballroom
9:40 am
10:00 am
Sponsor Visitation Break
9:40 am - 10:00 am
Track 1
Track 2
Track 3
Track 4
Hands-On Training
Sponsor Engineering and Education (SEE Track)
Highland A
Highland B
Highland C
Highland D/E
Cascade A/B/C
10:00 am
10:50 am
Defending Beyond Defense
Dr. Catherine J. Ullman
10:00 am-10:50 am
Track 1 - Highland A
Artificial Intelligence: Managing Risk, Regulation, and Reward
F. Paul Greene
10:00 am-10:50 am
Track 2 - Highland B
Cybersecurity for Small Businesses
Brandon Finton
10:00 am-10:50 am
Track 3 - Highland C
What Cyberattackers See: Top Tips for Minimizing Your Identity Attack Surface
Eric Woodruff
10:00 am-10:50 am
Track 4 - Highland D/E
Qasim Ijaz
10:00 am-11:50 am
Training - Cascade A/B/C
11:00 am
11:50 am
A Hardware Hacker's Perspective On Breaking and Defending XIoT Devices
Gabe Siftar and Zachary Lehmann
11:00 am-11:50 am
Track 1 - Highland A
SkyNet Is Coming For Email First... Thankfully!
Aubrey King
11:00 am-11:50 am
Track 2 - Highland B
How Not To Build a Cybersecurity Startup
JP Bourget
11:00 am-11:50 am
Track 3 - Highland C
API Sprawl and Open APIs: Potential Risks of Application Modernization
TBA
11:00 am-11:50 am
Track 4 - Highland D/E
12:00 pm
1:00 pm
1:00 pm
1:50 pm
DeFaking Deepfakes: Challenges for Real-World Mitigation of Manipulated Media
Matthew Wright
1:00 pm-1:50 pm
Track 1 - Highland A
Unlocking Generative AI: Balancing Innovation with Security
Jason Ross
1:00 pm-1:50 pm
Track 2 - Highland B
Thinking Like a Regulator - Making the Most of Your Data Protection Compliance Efforts
F. Paul Greene
1:00 pm-1:50 pm
Track 3 - Highland C
Demystifying Cloud Security and Compliance
Bob Adams
1:00 pm-1:50 pm
Track 4 - Highland D/E
Penetration Testing for Systems and Network Admins (continued)
1:00 pm-2:50 pm
Training - Cascade A/B/C
2:00 pm
2:50 pm
The Essentials of Enterprise Key Management (EKM)
Mark Warner
2:00 pm-2:50 pm
Track 1 - Highland A
Security Risks and Mitigations for Generative AI Foundation Models
Justin Leto
2:00 pm-2:50 pm
Track 2 - Highland B
This Is Not a Drill: The Importance of Incident Response Testing
Daniel J. Altieri and Laura K. Schwalbe
2:00 pm-2:50 pm
Track 3 - Highland C
Beyond Layers: Achieving Holistic Cybersecurity Through Tool Integration
Ryan Young
2:00 pm-2:50 pm
Track 4 - Highland D/E
3:00 pm
3:30 pm
Sponsor Visitation Break
3:00 pm - 3:30 pm
3:30 pm
4:30 pm
Keynote - Emilyann Fogarty
3:30 pm - 4:30 pm
Grand Lilac Ballroom
4:30 pm
5:30 pm
Happy Hour
4:30 pm - 5:30 pm
Start
End
7:30 am
8:30 am
Registration
7:30 am - 8:30 am
8:00 am
8:30 am
Breakfast
8:00 am - 8:30 am
8:30 am
8:40 am
Introductions
8:30 am - 8:40 am
Grand Lilac Ballroom
8:40 am
9:40 am
Keynote - Gene Spafford
8:40 am - 9:40 am
Grand Lilac Ballroom
9:40 am
10:00 am
Sponsor Visitation Break
9:40 am - 10:00 am
Track 1
Track 2
Track 3
Track 4
Hands-On Training
Sponsor Engineering and Education (SEE Track)
Highland A
Highland B
Highland C
Highland D/E
Cascade A/B/C
10:00 am
10:50 am
Small Step or Giant Leap? Cyber and Policy Progress Towards Satellite Security
William Malik
10:00 am-10:50 am
Track 1 - Highland A
Reducing the Attack Surface
David Frier
10:00 am-10:50 am
Track 2 - Highland B
Inside Sales Threat- How to Get Buy-In to Grow Your Cybersecurity Program
Paul Robinson
10:00 am-10:50 am
Track 3 - Highland C
Hacking the Cloud: Play-by-Play Attack
Ed Lin
10:00 am-10:50 am
Track 4 - Highland D/E
Tom Ricardo
10:00 am-11:50 am
Training - Cascade A/B/C
11:00 am
11:50 am
Catching More Flies - Spotting the Adversary With Honey Techniques
Matthew Gracie
11:00 am-11:50 am
Track 1 - Highland A
Five Questions to Ask Your PenTester
Qasim Ijaz
11:00 am-11:50 am
Track 2 - Highland B
It's OK to Make Mistakes: Blame Culture in Infosec
Courtney Bell
11:00 am-11:50 am
Track 3 - Highland C
The Hidden Power of Analytics in Information Security
Elena Matchey
11:00 am-11:50 am
Track 4 - Highland D/E
12:00 pm
1:00 pm
1:00 pm
1:50 pm
AppSec: Making Sense of the Wild West
Chris Peltz
1:00 pm-1:50 pm
Track 1 - Highland A
Rise of the Machines: The Future of AI in Cybersecurity
Reg Harnish
1:00 pm-1:50 pm
Track 2 - Highland B
Incident Response Roundtable
Rolin Peets, Mark Milutinovic, and Dave Hadzima
1:00 pm-1:50 pm
Track 3 - Highland C
2:00 pm
2:30 pm
Sponsor Visitation Break
3:00 pm - 3:30 pm
2:30 pm
3:20 pm
Automation in the SOC: A Winning Recipe
Joe Morin
2:00 pm-2:50 pm
Track 1 - Highland A
FLAME: Federated Learning Against Malicious Engineering - Employing Trust and Reputation to Enhance Learning Security and Privacy
Sergei Chuprov
2:00 pm-2:50 pm
Track 2 - Highland B
Planning for Success - And to Avoid Failing Before We've Even Begun
Eric Anderson
2:00 pm-2:50 pm
Track 3 - Highland C
3:30 pm
4:20 pm
Beyond Firewalls: A DevSecOps Approach to Elevating Application Security
Ben Wilcox
3:30 pm-4:20 pm
Track 1 - Highland A
Navigating the Cyber Threat Landscape in Healthcare: A Real-world Analysis of Attacks and Countermeasures
Eric Snyder
3:30 pm-4:20 pm
Track 2 - Highland B
Career Hacking: Going From n00b to Chaos Wrangler
Joe Cicero
3:30 pm-4:20 pm
Track 3 - Highland C
4:30 pm
5:30 pm
Prizes & Raffles
4:30 pm - 5:30 pm
Grand Lilac Ballroom