Day 1 | Day 2

Event Schedule – Day 1 – October 5

Start End
7:30am 8:30am Registration
8:00am 8:30am Breakfast
8:30am 8:40am Introductions
Grand Ballroom ABCD
8:40am 9:40am Keynote Speaker: IoT Security – Why We Need It and How to Get Started (Diana Kelley)
Grand Ballroom ABCD
9:40am 10:00am Sponsor Visitation Break
10:00am 10:50am Panel Discussion w/ Q&A – A Look at Cybersecurity from a Professional Fusion (Diana Kelley, Melissa Sokolowski, Garland Nichols, Julie Meyers, Lisa Bobo)
Grand Ballroom ABCD
10:50am 11:20am Sponsor Visitation Break Lockpick Village
Carson Room
Business Track Technical Track Compliance & Risk Management Track In-Depth Training Solutions & Demonstrations
Regency Ballroom Grand Ballroom EFG Wilmorite Room Suite #516 Wilson Boardroom
11:20am 12:10pm B1 – Bulls(***) on Parade: Security Theater Academy Awards (Reg Harnish)
T1 – Leveraging Recursive File Scanning Frameworks to Amplify Reverse Engineering Results (Jason Batchelor & Joshua Acklin) C1 – “What would you say…you do here?” Explaining Security to Management – and Vice Versa (Matt DeMatteo) SD1 – Cylance – Next-Generation Antivirus Powered by Artificial Intelligence (Peter Ritter) (Brite Computers)
12:20pm 1:30pm Lunch
1:30pm 2:20pm B2 – Securing Mobile Devices and the Enterprise Endpoint (Daniel Colonnese)
T2 – Modeling, Building, and Securing the Internet for Cyber Training Exercises (Ryan Lehman) C2 – Vendor Risk: The Back Door You Can’t Leave Unlocked (Keith Robertson) IT1 – Attacking and Defending the Application Layer (Jesse Darrone & Aubrey King) SD2 – Trends in Malware Detection and Incident Response (John Otte) (ePlus) Lockpick Village
Carson Room
2:30pm 3:20pm B3 – The Ever Changing Security Landscape (Jonathan Borgesen)
T3 – Bitclamp: A Permanent and Anonymous Publishing Platform Over Bitcoin (Joe Testa) C3 – Managing Cyber Risk from a Legal Perspective (F. Paul Greene) SD3 – Security Operations Centers: Focused Before, During, and After an Attack (Symantec)
3:20pm 3:40pm Sponsor Visitation Break
3:40pm 4:30pm B4 – Stop Reading about The Internet of Things and Start Doing Something About It (Andrew Phillips)
T4 – Story of Indicators – The Gaza Hackers (AKA Xtreme RAT) (Nir Yosha) C4 – Custom Frameworks, Compliance, and Critical Controls (Michael Montagliano & Jeanne Morelli) SD4 – Securing the Infrastructure for an Information Security Company (Ronald Dodge) (Palo Alto)
4:30pm 6:00pm Happy Hour

 

Day 1 | Day 2

Event Schedule – Day 2 – October 6

Start End
7:30am 8:30am Registration
8:00am 8:30am Breakfast
8:30am 10:10am Keynote Speaker: An Insider’s Guide to Cyber-Insurance and Security Guarantees (Jeremiah Grossman)
Grand Ballroom ABCD
10:10am 10:30am Sponsor Visitation Break Lockpick Village
Carson Room
Business Track OWASP Track Cyber Defense & Threat Landscape Track In-Depth Training Solutions & Demonstrations
Regency Ballroom Grand Ballroom EFG Wilmorite Room Suite #516 Wilson Boardroom
10:30am 11:20am B5 – Beyond the Checkbox: Building an Information Security Culture (Charles Profitt)
O1 – Introduction to Application Security and OWASP Top 10 Risks, Part 1 of 2 (Ralph Durkee) TH1 – The Effects of Zero-Day Attacks (Trevor Smith & Michael Poczobut) SD5 – Cloud Security – Some Basics to Help Keep Your Data Safe (Anthony Luz) (Meridian IT)
11:30am 12:20pm B6 – Backups: An IT Person’s Life Insurance (John D. Flory & Jeff Miller)
O2 – Introduction to Application Security and OWASP Top 10 Risks, Part 2 of 2 (John King) TH2 – Next Step in Cyber Defense & Response (Len Rosenberg) SD6 – The Eye of the Storm (Ladi Adefala) (Fortinet)
12:20pm 1:30pm Lunch
1:30pm 2:20pm B7 – Survive the Trenches of Zero-day Exploits (Vic Chung)
O3 – Common Developer Crypto Mistakes (Kevin W. Wall) TH3 – Public Sector Cybersecurity – Do We Really Have to Worry? (Daniel Whalen) IT2 – Attacking and Defending the Application Layer (Jesse Darrone & Aubrey King) SD7 – Ransomware – Protect or Pay (Mike Ruiz) (Zscaler) Lockpick Village
Carson Room
2:30pm 3:20pm B8 – Pandora’s Box Also Contained Hope​ (David C. Frier)
O4 – #DevOpsSec – Killing the Buzz? (Jason Ross) TH4 – SIEM Best Practices and Integration Strategies (Steve Lay) SD8 – Secure the Breach (Ron Stamboly) (Gemalto)
3:20pm 3:40pm Sponsor Visitation Break
3:40pm 4:30pm B9 – Trends in Effective Malware Detection and Incident Response (John Otte)
O5 – Web Application Firewall Evaluation with DevOps, SDLC and the New OWASP Core Rule Set (Chaim Sanders) TH5 – Penetration Testing and Shooting Fish in a Barrel (Kevin Wilkins) SD9 – Six Steps for Operationalizing Threat Intelligence (Russ Harnish) (Forsythe)
4:30pm 5:00pm Awards and Raffles
Grand Ballroom ABCD