2017 Agenda
7:00-8:15 |
Registration and BreakfastMcKnight Auditorium |
8:15-8:30 |
Introduction and Logistics |
8:30-9:15 |
KeynoteRethinking AppSec: Using Security Instrumentation to Find Vulnerabilities and Block Attacks |
9:15-9:30 |
Beverage Break / Networking |
9:15-4:55 |
Wells Fargo Capture the Flag Virtual Game |
9:30-10:15 |
Breakout PanelPanel Moderator – Career Panel & Before, During and After the BreachPanel: Before During and After the Breach |
9:30-10:15 |
BreakoutAdvances in Standards-based API SecurityRunning a Cloud-Powered Business Without Security CompromisesArchitectural Risk Analysis – A Systems Design Approach to Threat ModelingManaging Application Zero Day Vulnerabilities |
10:30-11:15 |
KeynoteThe State of Cyber: How stealthier attacks are blurring the lines between Cybercrime and Statecraft |
11:20-12:05 |
BreakoutCyber and User Behavior AnalyticsFuture of Cybersecurity Regulation and Enforcement in the U.S.Life After Ukraine; Industrial Control System Cybersecurity Industry Trends and StrategiesHow to Build Security and Risk Management into Agile EnvironmentsRisk Based Approach to Attack Surface Susceptibility and Validation |
12:05-1:30 |
Lunch |
1:40-2:25 |
Announcements – KeynoteHacking our Humanity: Biotechnology, Biohackers and the Edges of Discovery |
2:30-3:15 |
BreakoutBuilding Your Sec Ops Use CaseReal Time Cyber IntelligenceCCAA Innovation in Cybersecurity Automation |
3:15-3:30 |
Beverage Break – Networking |
3:35-4:15 |
BreakoutDeception InceptionDDoS Attacks: Lesson learned from analyzing 10,000 incidents and a case studyThe Continued Prevalence of People and Processes Over Technology |
3:35-4:15 |
Breakout PanelPanel: Know Your Employees, Stop Insider Threats |
4:20-4:55 |
CISO Closing PanelPanel: Career Panel – Today’s Cybersecurity Careers Landscape |
4:55-5:00 |
Closing Session |