Day 1 | Day 2

Event Schedule – Day 1 – October 9

Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 9:40am Keynote – Samy Kamkar
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
Business: Adapting to Change Business: Agility via DevOps Technical Track OWASP AppSec Track Hands-On Training Solutions & Demonstrations
Highland A Highland B Highland C Highland D Cascade DEF Cascade AB Aqueduct AB Aqueduct CD
10:00am 10:50am A1 – Cybersecurity Training for the Enterprise
Dennis M. Allen
B1 – Security and Chaos Engineering
Sean Atkinson
T1 – Advanced Penetration Testing Techniques
Joe Testa
O1 – What is the Android Colluded Applications Attack and How to Detect It
Igor Khokhlov,
Leon Reznik
H1 – Ohhhh-Sint: Look What We Found…
Dan Astor,
Evan Perotti
H2 – OWASP Capture the Flag
Jim Keeler
S1 – Putting the “Pro” in Proactive: Building A Next-Gen Cybersecurity Program
GreyCastle Security
S2 – Cyber Resilience
Fortinet
11:00am 11:50am A2 – Implementing MFA (Massively Favored Authentication) at RIT
Laura O’Donnell,
Clay Cooper
vacant T2 – SME to Lead, Tips for New Technical Managers
Dennis M. Allen
O2 – Pentesting DevOps: Attacking Containers and Container Orchestration
Mark Manning
S3 – IntroSpect User and Entity Behavior Analytics (UEBA)
Vandis
S4 – Beyond AV
Carbon Black
12:00pm 1:00pm Lunch
1:00pm 1:50pm A3 – Making Sense of Multi Factor Authentication
John D. Flory III,
Jeff Miller
B3 – Five Steps to a More Secure DevOps Environment
Bill Malik
T3 – Employing Digital Workers for Security Automation
Jonathan Borgesen
O3 – Rocking The (Vox)Vote
Jason Ross
(H1 continued) (H2 continued) S5 – Security Automation and Orchestration: The Secret Weapon for Excelling at Ordinary Security Operations
ServiceNow
S6 – Complete Device Visibility Across Your Organization
Brite Computers
2:00pm 2:50pm A4 – The Evolution of Segmentation: How Network Segmentation and Micro-Segmentation Aid in Threat Isolation and a Secure Posture
Matt Ostrowski
B4 – Don’t Call Me a Firewall: A Formula for Creating Cybersecurity Superheroes
Brian Murphy
T4 – Machine Learning in Information Security
Dain Perkins
O4 – Your Apps Have Gone Serverless. Has Your Security?
Tal Melamed
S7 – Creating the Cyber Kill Chain – How Threat Actors Gather Intel on You and Your Organization
IntSights
S8 – Employing Digital Workers for Security Automation
SMP
2:50pm 3:20pm Sponsor Visitation Break
3:20pm 4:20pm Keynote – Rich Smith
Lilac Grand Ballroom
4:20pm 5:30pm Happy Hour

 

Day 1 | Day 2

Event Schedule – Day 2 – October 10

Start End
Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 9:40am Keynote – Mark Weatherford
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
Business: Adapting to Change Business: Governance, Risk, & Compliance Technical Track OWASP AppSec Track Hands-On Training Solutions & Demonstrations
Highland A Highland B Highland C Highland D Cascade DEF Cascade AB Aqueduct AB Aqueduct CD
10:00am 10:50am A5 – Integrating Third Party Scoring Services into Your Enterprise KPIs
Joe Corsi,
Tony Karakashian
B5 – Small Business Privacy and the GDPR: How Did We Get Here?
Chaim Sanders
T5 – Exploring How Memory-Mapped Files Hide From Antivirus and Execute Malicious Code
Ben Holder
O5 – Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks
Danny Harris
H3 – Ohhhh-Sint: Look What We Found…
Dan Astor,
Evan Perotti
vacant S9 – The Real World of Threat Hunting: Tools, Tips and Recipes
Digital Guardian & Netskope
S10 – The Changing Security Landscape
Rolta AdvizeX & Thales
11:00am 11:50am A6 – Bug Bounty at my Org? It’s More Likely Than You Think
Ashley Rider,
Andrew Durgin
B6 – The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response
Michael Melore
T6 – Adopting AWS – Learn How to Deploy AWS Services Securely
Jeremiah Sahlberg
O6 – The Industrialization of Red and Blue Teaming
Ashley Zaya
S11 – Lessons Learned in Maturing Security Operations Centers
GuidePoint Security
S12 – Discovering the Unknown: Demystifying User Behavior Analytics (UBA)
Splunk
12:00pm 1:00pm Lunch
1:00pm 1:50pm A7 – Be a Hero with DMARC: Save Your Customers and Partners from Internet Villains!
Stephen Mitchell
B7 – Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [In]security
Daniel Gibson
T7 – Building the Panopticon: Logging and Alerting With Free Tools
Matthew Gracie
O7 – Understanding Web Application Firewalls with Open Source ModSecurity and OWASP Core Rule Set
Tin Zaw
(H3 continued) vacant S13 – Sophos S14 – Knowing your Network: Tracking your Assets in the Age of Machine-speed Attacks
Qadium
2:00pm 2:50pm B8 – Time Is Not on Your Side – The Legal Risk of Ransomware
F. Paul Greene

Lilac Grand Ballroom
T8 – Data Hoarders: Finding Needles in Stacks of Needles
James Pleger
vacant S15 – Detect, Prioritize and Block Attack Breach Escalation
CyberArk & Proofpoint
S16 – Advanced & Frictionless Security in a Multi-Cloud Environment
Palo Alto Networks
2:50pm 3:20pm Sponsor Visitation Break
3:20pm 4:20pm Keynote – Deborah Snyder
Lilac Grand Ballroom
4:20pm 5:00pm Awards and Raffles
Lilac Grand Ballroom