2016 Agenda
|
7:30-8:15 |
Registration and Breakfast
|
|
8:15-8:30 |
introduction and Logistics
|
|
8:30-9:15 |
Keynote
Micro-virtualization:CPU-Enforced Security and Privacy for an Era of Cloud and Mobility |
|
8:30-9:15 |
The Challenge with Detecting Silent Exits
Anthony Braddy, Cassio Goldschmidt, Andrew Wicker, John Melton |
|
9:15-9:30 |
Break – Raffle Drawings
|
|
9:30-10:15 |
Breakout SessionsPartnering with an Enterprise to assist with managing a 3rd Party Supply Chain Management Program while also providing testing services to vendors in the supply chain
Cloud Security and Mitigating Vulnerabilities
Richard Sheinis, Tony Ucedavelez Advanced Security Analytics: NetFlow for Incident Response
Dissecting Bitcoin Architecture and Security
|
|
10:15-10:30 |
Break – Raffle Drawings
|
|
10:30-11:15 |
Keynote
Network Defender First Principles |
|
11:15-11:30 |
Competition Announcement
|
|
11:30-5:00 |
Job Fair
|
|
11:30-12:15 |
Breakout SessionsIntelligence Driven Defense & Cyber Kill Chain
Stuck in the Middle with You: Security complexity in the telecommunications industry
Micah Williams, James Peterman Mobile Security and the CISO
CISO Panel: Career Advise and Workforce Panel
|
|
12:15-1:30 |
Lunch
|
|
1:30-2:30 |
Keynote
What If We Win? |
|
2:30-3:15 |
Breakout SessionsThink Your Mobile App Is Secure? Think Again…
Machine Learning for Cloud Security – Challenges and Opportunities
UNC Charlotte Security Research
Microservices Security
|
|
3:15-3:30 |
Break
|
| 3:30-4:15 |
Breakout SessionsMonitoring Attack Surface Analysis to Secure DevOps Pipelines
Panel: Cyber Intelligence
Jack Freund, Christopher Houser “Hunting in the Dark”
|
| 4:15-5:00 |
Keynote
The New Era of Security |
| 5:15-6:15 |
CISSP Reception
|
Lucas Room