7:00-8:15 |
Registration and Breakfast
|
8:15-8:30 |
Introduction and Logistics
Dr. Bill Chu
|
8:30-9:30 |
Keynote – Mcknight auditorium
Mischel Kwon Getting the Board’s Buy in Through Social Metrics
|
9:30-9:45 |
Break/Networking
|
9:30-4:15 |
Capture the Flag
|
9:45-10:30 |
Breakout Sessions
Eric Docktor & Ken Beer How to Think About Data Security in the Cloud – McKnight Auditorium
Sam Migues Risk: They Can’t Manage What They Don’t Know About – Cone 210
Joel Amick & Scott Rodgers Threat Hunting With Data Mining and Analytics – cone 112
Bojan Simic What Works, What Doesn’t in Upgrading and Implementing Cyber Security Technology – cone 111
Ethics Panel Roger Callahan, Brian Cyprian, Matt Donato – cone 113
Briana McIntyre The New Definition of Cybersecurity; How Organizations Save the Talent Deficit – cone 208
|
10:30-11:00 |
BREAK/NETWORKING
|
11:00-12:00 |
Keynote – mcknight auditorium
Chris Roberts The Abyss is Waving Back
|
12:00-1:30 |
Lunch
Lunch Speaker: Sounil Yu Understanding the Cybersecurity Landscape using the Cyber Defense Matrix – sac salons and food court
|
1:30-2:30 |
Announcements and Keynote – mcknight auditorium
Elena Kvochko Talent is the Present and Future of Cybersecurity
|
2:30-3:15 |
BREAKOUT SESSIONS
Matthew Snyder Industrial Security – Old Challenges / New Opportunities – mcknight auditorium
Wendy Nather Denial of Trust: The New Attacks – cone 210
Privacy Panel Allen O’Rourke, Christine Frye, Kim Fleming, Alysa Austin – cone 112
Nick Mistry Addressing the Cloud Security Challenge – cone 111
Scott Hubert The Rise of Machine Learning and Behavioral Analytics in Data Protection – cone 113
Unexpected and Unconventional – Yet Here We Are Women In Cyber Panel Ashley Harmon, Margaret White, Briana McIntyre, Ikran Hassan – cone 208
|
3:15-3:30 |
BREAK/NETWORKING
|
3:30-4:15 |
BREAKOUT SESSIONS
Jeff Greene The Five Stages of (IOT) Grief – mcknight auditorium
Jeff Crume Leveraging AI for Cyber Security – cone 210
Chris Nickerson Getting Value from Testing, Not Just a Report – cone 112
Yongee Wang Crytographic Currency, Blockchains, Smart Contract and Distributed Trust – cone 111
Ehab Al-Shaer Automation of Cyber Threat Intelligence Analytics and Hunting – cone 113
Brandi Keough Applying the Scientific Method to Cybersecurity Event Analysis – cone 208
|
4:20-5:00 |
Closing Session – mcknight auditorium
CISO Panel Bill Chu, Jeremiah Grant, Ken Bailey, Andre Mintz
|
5:00-6:30 |
Recruitment Reception – Job Fair
Lucas Room
|