2018 Agenda

7:00-8:15

Registration and Breakfast

 

8:15-8:30

Introduction and Logistics

Dr. Bill Chu

8:30-9:30

Keynote – Mcknight auditorium

Mischel Kwon
Getting the Board’s Buy in Through Social Metrics

9:30-9:45

Break/Networking

 

9:30-4:15

Capture the Flag

 

9:45-10:30

Breakout Sessions

Eric Docktor & Ken Beer
How to Think About Data Security in the Cloud – McKnight Auditorium

Sam Migues
Risk: They Can’t Manage What They Don’t Know About – Cone 210

Joel Amick & Scott Rodgers
Threat Hunting With Data Mining and Analytics – cone 112

Bojan Simic
What Works, What Doesn’t in Upgrading and Implementing Cyber Security Technology – cone 111

Ethics Panel
Roger Callahan, Brian Cyprian, Matt Donato – cone 113

Briana McIntyre
The New Definition of Cybersecurity; How Organizations Save the Talent Deficit – cone 208

10:30-11:00

BREAK/NETWORKING

 

11:00-12:00

Keynote – mcknight auditorium

Chris Roberts
The Abyss is Waving Back

12:00-1:30

Lunch

Lunch Speaker: Sounil Yu
Understanding the Cybersecurity Landscape using the Cyber Defense Matrix – sac salons and food court

1:30-2:30

Announcements and Keynote – mcknight auditorium

Elena Kvochko
Talent is the Present and Future of Cybersecurity

2:30-3:15

BREAKOUT SESSIONS

Matthew Snyder
Industrial Security – Old Challenges / New Opportunities – mcknight auditorium

Wendy Nather
Denial of Trust: The New Attacks – cone 210

Privacy Panel
Allen O’Rourke, Christine Frye, Kim Fleming, Alysa Austin – cone 112

Nick Mistry
Addressing the Cloud Security Challenge – cone 111

Scott Hubert
The Rise of Machine Learning and Behavioral Analytics in Data Protection – cone 113

Unexpected and Unconventional – Yet Here We Are
Women In Cyber Panel
Ashley Harmon, Margaret White, Briana McIntyre, Ikran Hassan – cone 208

 

3:15-3:30

BREAK/NETWORKING

 

3:30-4:15

BREAKOUT SESSIONS

Jeff Greene
The Five Stages of (IOT) Grief – mcknight auditorium

Jeff Crume
Leveraging AI for Cyber Security – cone 210

Chris Nickerson
Getting Value from Testing, Not Just a Report – cone 112

Yongee Wang
Crytographic Currency, Blockchains, Smart Contract and Distributed Trust – cone 111

Ehab Al-Shaer
Automation of Cyber Threat Intelligence Analytics and Hunting – cone 113

Brandi Keough
Applying the Scientific Method to Cybersecurity Event Analysis – cone 208

4:20-5:00

Closing Session – mcknight auditorium

CISO Panel
Bill Chu, Jeremiah Grant, Ken Bailey, Andre Mintz

5:00-6:30

Recruitment Reception – Job Fair

Lucas Room