Tentative Schedule – May be subject to change

Day 1 – October 12 (Wednesday)

Start End  
7:30 am 8:30 am Registration
8:00 am 8:30 am Breakfast
8:30 am 8:40 am Introductions
Grand Lilac Ballroom
8:40 am 9:40 am Keynote – Doug Landoll
Grand Lilac Ballroom
9:40 am 10:00 am Sponsor Visitation Break
    Track 1 Track 2 Sponsor Engineering and Education (SEE Track)
    Highland A/B Highland C/D/E Aqueduct A/B Aqueduct C/D
10:00 am 10:50 am Size Matters – Why Cybersecurity Fails for 99.7% of Us
Reg Harnish
Investigating Windows Endpoints With Free Tools
Matthew Gracie
Cloud Security Alphabet Soup:Making Sense of Modern Cloud Security Tooling
GuidePoint Security
CyberArk
11:00 am 11:50 am PCI Compliance as a Security Project
David Frier
GET IN THE BOX: Containerizing Red Team Infrastructure
Dan Astor
Jonn Callahan
Securing Data in the Cloud
Varonis
Three Steps to Build a Consolidated Security Detection, Response & Remediation Pipeline
Cribl
12:00 pm 1:00 pm Lunch
1:00 pm 1:50 pm SOC Modernization: 5 Pillars for Driving Differentiation to Improve Security Operations
Chris Gray
Conftest: Expressing and Enforcing Policy for Configuration Systems
Anthony Critelli
HuntingH4X Securonix CTF 2022
Securonix
Atlantic Data Security
2:00 pm 2:50 pm Interactive Incident Response
John D. Flory III & Panel
The Journey of Security Automation
Peter Luo
Global Threat Landscape
CrowdStrike
SentinelOne
3:00 pm 3:30 pm Sponsor Visitation Break
3:30 pm 4:30 pm Keynote – Dr. Josephine Wolff
Grand Lilac Ballroom
4:30 pm 5:30 pm Happy Hour

 
 

Day 2 – October 13 (Thursday)

Start End  
7:30 am 8:30 am Registration
8:00 am 8:30 am Breakfast
8:30 am 8:40 am Introductions
Grand Lilac Ballroom
8:40 am 9:40 am Keynote
Grand Lilac Ballroom
9:40 am 10:00 am Sponsor Visitation Break
    Track 1 Track 2 Solutions & Demonstrations
    Highland A/B Highland C/D/E Aqueduct A/B Aqueduct C/D
10:00 am 10:50 am Cyber Risk Assessment
Justin Pelletier
The Silent Scream of Every Network: The Horror that is Active Directory Security
Tim Oroszi
Arctic Wolf Networks Simplifying Cyber Security with Critical Start MDR Services
Critical Start
11:00 am 11:50 am Redesigning the IT Department And The Evolving Roles of Security
Jonathan Borgesen
Feature or a Vulnerability? Tales of an Active Directory Pentest
Qasim Ijaz
Mesh – Bolstering Cyber Response with Integration and Automation
Fortinet
Brite
12:00 pm 1:00 pm Lunch
1:00 pm 1:50 pm A Program-Based Approach to Securing Software Development
Stan Letarte
Securing Your Cloud Network
Thomas A Ricardo
Redefining Security Validation
ePlus
Trend Micro
2:00 pm 2:50 pm Protect the App, not the Network. Zero Trust Superpowers with OpenZiti
Clint Dovholuk
Become a Cyber Warrior for Free, Courtesy of Uncle Sam!
Christopher May
Passwordless Authentication…Problematic, Probable or Panacea?
ForgeRock
Endpoint real-time remediation with
Tanium
3:00 pm 3:30 pm Sponsor Visitation Break
3:30 pm 4:20 pm Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
Jonathan Leitschuh
Anatomy of a Ransomware Attack
Ed Lin
4:30 pm 5:00 pm Prizes & Raffles
Grand Lilac Ballroom