Schedule

MONDAY, APRIL 3

7:30 AM - 8:30 AM Registration and Continental Breakfast
8:30 AM - 9:30 AM
 Welcome Keynote: Radical Remodeling: Renovating Security for Today's Problems and Tomorrow's Opportunities, presented by Rich Mogull

9:30 AM - 9:45 AM Tech Spotlight Session presented by HP
9:45 AM - 10:00 AM Refreshment Break
10:00 AM - 11:00 AM Concurrent Sessions
      A1 Ninja Looting Like A Pirate
      B1 Data Protection - How to Sleep Better at Night
      C1 Management Hacking 101: Leading High Performance Security Teams
      D1 Launch, Detect, Evolve: The Mutation of Malware
      E1 Watch Out! Yet Another Regulator is Asking Questions!
      F1 Incident Response: The First 48
      G1 Protecting Dollars for Pennies: Improving organizational security with effective, inexpensive solutions (90 min)

11:00 AM - 11:50 AM Concurrent Sessions
      A2 Pentesting Yourself to DEBT
      B2 Do You Have a Mega Breach Brewing?
      C2 Late-breaking session
      D2 Applying Analytics to Cyber Threat Intelligence
      E2 Insider Risk: Attacking the Threat From Within
      F2 Behavioral Analysis Using DNS, Network Traffic, and Logs
12:00 PM - 1:15 PM Networking Lunch
1:15 PM - 2:05 PM Concurrent Sessions
      A3 Everything is Code: Why should you worry about software security and coding standards?
      B3 Late-breaking session
      C3 It's Not If But When: How to Create Your Cyber Incident Response Plan
      D3 Developing a Threat and Vulnerability Management Program: A Pentester's Perspective
      E3 Vendor Vetting: Who's touching your stuff?
      F3 Application Security: From the Ground Up
      G2 Risk v Threat: Threat Intelligence Exposed (90 min)
2:15 PM - 3:05 PM Concurrent Sessions
      A4 Scouting AWS Accounts for Security Gaps
      B4 Secure Development for the Cloud
      C4 I Have Phish I's For You
      D4 Forensics and Discovery Obligations vs. International Privacy Law
      E4 Self-Audits: Applying User Context to Activity Anomalies
      F4 Late-breaking session
3:05 PM - 3:30 PM Refreshment Break
3:30 PM - 4:20 PM Concurrent Sessions
      A5 The Exploits Used in Ransomware Campaigns
      B5 Secure Data Logistics: How Information Security Can Learn from Armored Cars
      C5 Cutting Through the Security Analytics Hype
      D5 Late-breaking session
      E5 An Aflac Case Study: Moving a security program from defense to offense
      F5 Rise of Cyber Hunting: Not Falling Victim To Undetected Breaches
      G3 Securing Innovation (75 min)
4:30 PM - 5:00 PM Panel Discussion: Cyber Liability Insurance: Misinformation Everywhere!
5:00 PM - 6:00 PM Welcome Reception in the Expo

TUESDAY, APRIL 4

7:30 AM - 8:15 AM Breakfast Power Session 
7:30 AM - 8:30 AM Continental Breakfast
8:30 AM - 9:30 AM Keynote Address: Rebooting the Auto Industry: When Security Affects Safety, presented by Craig Smith
9:40 AM - 10:30 AM Concurrent Sessions
      A6 Everything I Know About Security I Learned From Watching Kung Fu Movies
      B6/B7 Your Data was Breached, Now What? An Interactive Incident Response Tabletop Experience
      C6 Becoming Bi-lingual: Community Cybersecurity as a Business Impact
      D6 Corporate Cannabis: Lessons Learned in Modeling a Controversial Threat Profile
      E6 Late-breaking session
      F6 Mutiny on the Bounty: Handling security in a bug bounty world
      G4 IoT Security and its Impact on Your Job (90 min)
10:40 AM - 11:30 AM Concurrent Sessions
      A7 Excuse me, Server, do you have the time?
      B6/B7 Your Data was Breached, Now What? An Interactive Incident Response Tabletop Experience
      C7 Late-breaking session
      D7 The Details of Forensic Case Studies
      E7 Creating a Relevant Cyber Security Governance Framework: Supporting Business Digital Transformation
      F7 Getting Off the Back Foot – Employing Active Defense
      G4 IoT Security and its Impact on Your Job
11:30 AM Expo Opens
12:00 PM Lunch on the Expo Floor
1:30 PM - 2:30 PM Keynote Address: 1998 Called and It Wants Its Stupid Internet Law Back...Before It Destroys the World, presented by Cory Doctorow
2:30 PM - 3:00 PM Refreshment Break with Exhibitors
3:00 PM - 3:50 PM Concurrent Sessions
      A8 Late-breaking session
      B8 Pi in the Sky: The push towards cloud-based applications
      C8 Fast, Cheap or Good? How a Fortune 500 picked all three in assessing enterprise to cloud application migration risks
      D8 Threat Modeling Wearables By 2019
      E8 Moving Mountains through Measurement
      F8 Victory in 100 Battles: How to Perform a Successful Asset Inventory
      G5 The Technology is Worth 5% (90 min)

4:00 PM - 4:50 PM Concurrent Sessions
      A9 Abnormal Behavior Detection in Large Environments
      B9 Late-breaking session
      C9 Information Security Assessments: Building bridges instead of making enemies
      D9 Facing Emerging Threats - Evolving from Penetration Testing to Capability Effectiveness Testing
      E9 Case Study: Atlassian’s Journey Through CSA Certification
      F9 The Phishing Kill Chain
      G5 The Technology is Worth 5%

4:50 PM - 6:15 PM Networking Reception with Exhibitors

WEDNESDAY, APRIL 5

8:00 AM - 8:30 AM Continental Breakfast in the Expo
8:30 AM - 9:30 AM Keynote Address: The Three T’s of Security: Talent, Tools & Techniques, presented by Jim Routh
9:30 AM - 11:00 AM Refreshment Break in the Expo
10:30 AM - 11:20 AM Concurrent Sessions
      A10 Hacking Blockchain
      B10 Patients Have Lost Patience for Data Breaches
      C10 What We Learn from Hackers ... and the Government
      D10 Social Engineering: It's Not Just for Suckers Anymore
      E10 Cyber Liability Insurance 101 - What you should know before and after a breach
      F10 Dealing with Cyberextortion, Ransomware, and Other Bad Stuff
      G6 Is Enterprise Resiliency the New Security Strategy (75 min)

11:30 AM - 12:15 PM Closing Plenary Panel:You’re in a Leadership Position, Now What? 

    Event Sponsor
 HP 200x110
 
 

      Platinum Sponsors

 Lieberman 200x110

Malwarebytes 200x110 

 

   

  

 

 

      Gold Sponsors

CheckPoint 200x110

Cylance 200x110

 

 

        Silver Sponsors

  Darktrace 200x110

  GRSEE 200x110

      KnowBe4 200x110

   LogRhythm 200x110

  Phishlabs 200x110

  Qualys 200x110