2016 Agenda
7:30-8:15 |
Registration and BreakfastLucas Room |
8:15-8:30 |
introduction and Logistics |
8:30-9:15 |
KeynoteMicro-virtualization:CPU-Enforced Security and Privacy for an Era of Cloud and Mobility |
8:30-9:15 |
The Challenge with Detecting Silent ExitsAnthony Braddy, Cassio Goldschmidt, Andrew Wicker, John Melton |
9:15-9:30 |
Break – Raffle Drawings |
9:30-10:15 |
Breakout SessionsPartnering with an Enterprise to assist with managing a 3rd Party Supply Chain Management Program while also providing testing services to vendors in the supply chain
Cloud Security and Mitigating VulnerabilitiesRichard Sheinis, Tony Ucedavelez Advanced Security Analytics: NetFlow for Incident ResponseDissecting Bitcoin Architecture and Security |
10:15-10:30 |
Break – Raffle Drawings |
10:30-11:15 |
KeynoteNetwork Defender First Principles |
11:15-11:30 |
Competition Announcement |
11:30-5:00 |
Job Fair |
11:30-12:15 |
Breakout SessionsIntelligence Driven Defense & Cyber Kill ChainStuck in the Middle with You: Security complexity in the telecommunications industryMicah Williams, James Peterman Mobile Security and the CISOCISO Panel: Career Advise and Workforce Panel |
12:15-1:30 |
Lunch |
1:30-2:30 |
KeynoteWhat If We Win? |
2:30-3:15 |
Breakout SessionsThink Your Mobile App Is Secure? Think Again…Machine Learning for Cloud Security – Challenges and OpportunitiesUNC Charlotte Security ResearchMicroservices Security |
3:15-3:30 |
Break |
3:30-4:15 |
Breakout SessionsMonitoring Attack Surface Analysis to Secure DevOps PipelinesPanel: Cyber IntelligenceJack Freund, Christopher Houser “Hunting in the Dark” |
4:15-5:00 |
KeynoteThe New Era of Security |
5:15-6:15 |
CISSP Reception |