Day 1 | Day 2

Event Schedule – Day 1 – October 2

Start End
Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 9:40am Keynote – F. Paul Greene
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
Incident Response Track Cybersecurity Management Track Risk Remediation & Security Controls Track Interactive & Hands-on Education Sponsor Engineering & Education
Highland A Highland B/C Highland D/E Cascade A/B Aqueduct A/B Aqueduct C/D
10:00am 10:50am Practical Incident Response: An Interactive Tabletop Exercise
John D. Flory III,
Bruce Cheney,
Chandra Whitley,
Jenny Holmes
Perspectives on Establishing “Cyber Confidence”
Tom Podnar
Leveling Up Your Entire Security Program (Not Just DFIR) With ATT&CK
Bob Rudis
SOC Analyst for a Day
Joe Pizzo
Anatomy of a Cyber Attack
Varonis
Modernizing IT: Securing Identities and Data When Moving to the Cloud
Okta
11:00am 11:50am Planning Successful Red Team Operations
Joe Christian
Lessons from the Orange Book
David Frier
App-abet Soup – should you DAST, SAST or RASP?
Rapid7
BlackBerry Cylance
12:00pm 1:00pm Lunch
1:00pm 1:50pm Establishing an Incident Response Plan
Michael McCartney
A Theme of Fear: Hacking the Paradigm
Dr. Catherine J. Ullman
Data Privacy is a Human Right
Jason Woodson
Secure by Design; Not Regret
iV4 / Qualys
Zero Trust
LogRhythm
2:00pm 2:50pm Business Continuity & Disaster Recovery Interactive Tabletop Presentation
Carl Benevento,
Bo Jayakumar
We’re All Winners: Gamification and Security Awareness
Ben Woelk
Cyber-Physical Safety
Duncan Sparrell
Solving Problems Tools Can’t
GuidePoint Security
10 Features of a Modern SIEM
Exabeam
3:00pm 3:30pm Sponsor Visitation Break
3:30pm 4:30pm Keynote – Johnny Xmas
Lilac Grand Ballroom
4:30pm 5:30pm Happy Hour

 

Day 1 | Day 2

Event Schedule – Day 2 – October 3

Start End
Start
7:30am
End
8:30am
Registration
8:00am 8:30am Breakfast
8:30am 9:40am Keynote – Reg Harnish
Lilac Grand Ballroom
9:40am 10:00am Sponsor Visitation Break
OWASP Track Threats & Threat Hunting Track Technical Track Interactive & Hands-on Education Sponsor Engineering & Education
Highland A Highland B/C Highland D/E Cascade A/B Aqueduct A/B Aqueduct C/D
10:00am 10:50am Secure Your Web Apps by Training Developers to Break Them
Jim Keeler
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Matthew Wright
Smartphone security evaluation in the era of Big Data
Igor Khokhlov,
Leon Reznik
Threat Hunting Challenge
Eric Ayotte
Cybersecurity: Ground Zero
IGI
Breach and Attack Simulation and the Dirty Dozen TTPs
AttackIQ
11:00am 11:50am Supercharge your SOC with 3 Killer Threat Hunting Use Cases
Patrick Keenan
Endpoint Visibility with Osquery and Loki
George Adams,
Ed Welch
Protect Your Business with Security Delivered from the Cloud
Palo Alto Networks
InProgress Attack? Detect, Disrupt and Block with CyberArk & Proofpoint!
12:00pm 1:00pm Lunch
1:00pm 1:50pm Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows
Ralph Durkee
The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive
Matthew Gracie
Kubernetes Security Tools and Pentesting Methodology
Mark Manning
SOC Analyst for a Day
Joe Pizzo
Digital Forensics vs. Incident Response – When to Stop Investigating and Start Recovering
GreyCastle Security
Encrypted Things: Network Detection & Response in an Encrypted World
Gigamon
2:00pm 2:50pm Supercharged SIEM: Empowering your logs with the right data
Tom Kopchak
PErfidious: Make PE backdooring great again!
Shreyans Devendra Doshi
Taking Security Visibility Beyond SIEM: Data Analytics and Security Automation
Sirius
The 1/10/60 Minute Challenge: A Framework For Stopping Breaches Faster
CrowdStrike
3:00pm 3:30pm Sponsor Visitation Break
3:30pm 4:20pm Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (cont.)
Ralph Durkee
Threat Hunting: The Incredible Journey
Zach Bevilacqua
How to harden a medical device – It’s easier than you think
Dan Megalo
4:30pm 5:00pm Awards and Raffles
Lilac Grand Ballroom