2016 Agenda
7:30-8:15 |
Registration and Breakfast
|
8:15-8:30 |
introduction and Logistics
|
8:30-9:15 |
Keynote
Micro-virtualization:CPU-Enforced Security and Privacy for an Era of Cloud and Mobility |
8:30-9:15 |
The Challenge with Detecting Silent Exits
Anthony Braddy, Cassio Goldschmidt, Andrew Wicker, John Melton |
9:15-9:30 |
Break – Raffle Drawings
|
9:30-10:15 |
Breakout SessionsPartnering with an Enterprise to assist with managing a 3rd Party Supply Chain Management Program while also providing testing services to vendors in the supply chain
Cloud Security and Mitigating Vulnerabilities
Richard Sheinis, Tony Ucedavelez Advanced Security Analytics: NetFlow for Incident Response
Dissecting Bitcoin Architecture and Security
|
10:15-10:30 |
Break – Raffle Drawings
|
10:30-11:15 |
Keynote
Network Defender First Principles |
11:15-11:30 |
Competition Announcement
|
11:30-5:00 |
Job Fair
|
11:30-12:15 |
Breakout SessionsIntelligence Driven Defense & Cyber Kill Chain
Stuck in the Middle with You: Security complexity in the telecommunications industry
Micah Williams, James Peterman Mobile Security and the CISO
CISO Panel: Career Advise and Workforce Panel
|
12:15-1:30 |
Lunch
|
1:30-2:30 |
Keynote
What If We Win? |
2:30-3:15 |
Breakout SessionsThink Your Mobile App Is Secure? Think Again…
Machine Learning for Cloud Security – Challenges and Opportunities
UNC Charlotte Security Research
Microservices Security
|
3:15-3:30 |
Break
|
3:30-4:15 |
Breakout SessionsMonitoring Attack Surface Analysis to Secure DevOps Pipelines
Panel: Cyber Intelligence
Jack Freund, Christopher Houser “Hunting in the Dark”
|
4:15-5:00 |
Keynote
The New Era of Security |
5:15-6:15 |
CISSP Reception
|