Tentative Schedule – May be subject to change

Day 1 | Day 2

Event Schedule – Day 1 – October 2

Start End
Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 8:40am Introductions
Lilac Grand Ballroom
8:40am 9:40am Keynote – TBD
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
Incident Response Track Cybersecurity Management Track Risk Remediation & Security Controls Track Interactive & Hands-on Education Sponsor Engineering & Education
Highland A Highland B/C Highland D/E Cascade A/B Aqueduct A/B Aqueduct C/D
10:00am 10:50am Practical Incident Response: An Interactive Tabletop Exercise Perspectives on Establishing “Cyber Confidence” Leveling Up Your Entire Security Program (Not Just DFIR) With ATT&CK SOC Analyst for a Day
11:00am 11:50am Planning Successful Red Team Operations Lessons from the Orange Book
12:00pm 1:00pm Lunch
1:00pm 1:50pm Establishing an Incident Response Plan A Theme of Fear: Hacking the Paradigm A People’s History of Data Breaches Business Continuity & Disaster Recovery Interactive Tabletop
2:00pm 2:50pm Tales from the Crypt: Hair Raising Stories of Incident Response Gone Wrong We’re All Winners: Gamification and Security Awareness Premediation: The Art of Proactive Remediation
3:00pm 3:30pm Sponsor Visitation Break
3:30pm 4:30pm Keynote – Johnny Xmas
Lilac Grand Ballroom
4:30pm 5:30pm Happy Hour

 

Day 1 | Day 2

Event Schedule – Day 2 – October 3

Start End
Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 8:40am Introductions
Lilac Grand Ballroom
8:40am 9:40am Keynote – Reg Harnish
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
OWASP Track Threats & Threat Hunting Track Technical Track Interactive & Hands-on Education Sponsor Engineering & Education
Highland A Highland B/C Highland D/E Cascade A/B Aqueduct A/B Aqueduct C/D
10:00am 10:50am Ethical Web Hacking Training Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning Smartphone security evaluation in the era of Big Data Threat Hunting Challenge
11:00am 11:50am Supercharge your SOC with 3 Killer Threat Hunting Use Cases Endpoint Visibility with Osquery and Loki
12:00pm 1:00pm Lunch
1:00pm 1:50pm Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive Kubernetes Security Tools and Pentesting Methodology SOC Analyst for a Day
2:00pm 2:50pm Supercharged SIEM: Empowering your logs with the right data PErfidious: Make PE backdooring great again!
3:00pm 3:30pm Sponsor Visitation Break
3:30pm 4:20pm Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (cont.) Threat Hunting: The Incredible Journey How to harden a medical device – It’s easier than you think Cyber-Physical Safety
4:30pm 5:00pm Awards and Raffles
Lilac Grand Ballroom