Day 1 – October 12 (Wednesday)

Start End  
7:30 am 8:30 am Registration
8:00 am 8:30 am Breakfast
8:30 am 8:40 am Introductions
Grand Lilac Ballroom
8:40 am 9:40 am Keynote – Doug Landoll
Grand Lilac Ballroom
9:40 am 10:00 am Sponsor Visitation Break
    Track 1 Track 2 Sponsor Engineering and Education (SEE Track)
    Highland A/B Highland C/D/E Aqueduct A/B Aqueduct C/D
10:00 am 10:50 am Size Matters –
Why Cybersecurity Fails for 99.7% of Us

Reg Harnish
Investigating Windows Endpoints
With Free Tools

Matthew Gracie
Cloud Security Alphabet Soup:Making Sense of Modern Cloud Security Tooling
GuidePoint Security
CyberArk's End-To-End Identity Security Platform
CyberArk
11:00 am 11:50 am PCI Compliance as a Security Project
David Frier
Get in the Box:
Containerizing Red Team Infrastructure

Dan Astor
Jonn Callahan
Securing Data in the Cloud
Varonis
Three Steps to Build a Consolidated Security Detection, Response & Remediation Pipeline
Cribl
12:00 pm 1:00 pm Lunch
1:00 pm 1:50 pm SOC Modernization:
5 Pillars for Driving Differentiation to Improve Security Operations

Chris Gray
Conftest: Expressing and Enforcing Policy for Configuration Systems
Anthony Critelli
HuntingH4X Securonix CTF 2022
Securonix
Do More Toys Really Mean More Fun?
Atlantic Data Security
2:00 pm 2:50 pm Interactive Incident Response
John D. Flory III
Michael McCartney
Rolin Peets
Tyler Wrightson
The Journey of Security Automation
Peter Luo
Global Threat Landscape
CrowdStrike
Cloud-Native Defense in Depth
SentinelOne
3:00 pm 3:30 pm Sponsor Visitation Break
3:30 pm 4:30 pm Keynote – Dr. Josephine Wolff
Grand Lilac Ballroom
4:30 pm 5:30 pm Happy Hour

 
 

Day 2 – October 13 (Thursday)

Start End  
7:30 am 8:30 am Registration
8:00 am 8:30 am Breakfast
8:30 am 8:40 am Introductions
Grand Lilac Ballroom
8:40 am 9:40 am Keynote – Jordan Slavik
Grand Lilac Ballroom
9:40 am 10:00 am Sponsor Visitation Break
    Track 1 Track 2 Solutions & Demonstrations
    Highland A/B Highland C/D/E Aqueduct A/B Aqueduct C/D
10:00 am 10:50 am Cyber Risk Assessment
Justin Pelletier
The Silent Scream of Every Network: The Horror that is Active Directory Security
Tim Oroszi
Boom! What Happens Now?
Arctic Wolf Networks
Simplifying Cyber Security with Critical Start MDR Services
Critical Start
11:00 am 11:50 am Redesigning the IT Department And The Evolving Roles of Security
Jonathan Borgesen
Feature or a Vulnerability? Tales of an Active Directory Pentest
Qasim Ijaz
Mesh – Bolstering Cyber Response with Integration and Automation
Fortinet
Build or Buy a SOC: Keys to Your Success
Brite
12:00 pm 1:00 pm Lunch
1:00 pm 1:50 pm A Program-Based Approach to Securing Software Development
Stan Letarte
Securing Your Cloud Network
Thomas A Ricardo
Redefining Security Validation
ePlus
Attack Surface Risk Management and Incident Response
Trend Micro
2:00 pm 2:50 pm Protect the App, not the Network. Zero Trust Superpowers with OpenZiti
Clint Dovholuk
Become a Cyber Warrior for Free, Courtesy of Uncle Sam!
Christopher May
Passwordless Authentication…Problematic, Probable or Panacea?
ForgeRock
Endpoint Real-Time Remediation with
Tanium
3:00 pm 3:30 pm Sponsor Visitation Break
3:30 pm 4:20 pm Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
Jonathan Leitschuh
Anatomy of a Ransomware Attack
Ed Lin
   
4:30 pm 5:00 pm Prizes & Raffles
Grand Lilac Ballroom