7:00-8:15 |
Registration and Breakfast
McKnight Auditorium
|
8:15-8:30 |
Introduction and Logistics
McKnight Auditorium
Dean Fatma Mili, Bill Chu
|
8:30-9:15 |
Keynote
McKnight Auditorium
Rethinking AppSec: Using Security Instrumentation to Find Vulnerabilities and Block Attacks
Jeff Williams
|
9:15-9:30 |
Beverage Break / Networking
Lucas Room
|
9:15-4:55 |
Wells Fargo Capture the Flag Virtual Game
Cone 110
|
9:30-10:15 |
Breakout Panel
Halton Reading Room
Panel Moderator – Career Panel & Before, During and After the Breach
Roger Callahan
Panel: Before During and After the Breach
Allen O’Rourke, Leonard Bailey, Megan Stifel
|
9:30-10:15 |
Breakout
Advances in Standards-based API Security
McKnight Auditorium
Pam Dingle
Running a Cloud-Powered Business Without Security Compromises
Cone 111
David Rogers
Architectural Risk Analysis – A Systems Design Approach to Threat Modeling
Cone 112
Jim Peterman
Managing Application Zero Day Vulnerabilities
Cone 113
Adrian Wood, Chris Howser
|
10:30-11:15 |
Keynote
McKnight Auditorium
The State of Cyber: How stealthier attacks are blurring the lines between Cybercrime and Statecraft
Jerry Dixon
|
11:20-12:05 |
Breakout
Cyber and User Behavior Analytics
McKnight Auditorium
Keith Gordon
Future of Cybersecurity Regulation and Enforcement in the U.S.
Cone 111
Maneesha Mithal
Life After Ukraine; Industrial Control System Cybersecurity Industry Trends and Strategies
Cone 112
Brian Proctor
How to Build Security and Risk Management into Agile Environments
Cone 113
Dan Blum
Risk Based Approach to Attack Surface Susceptibility and Validation
Srinivas Mukkamala
|
12:05-1:30 |
Lunch
Student Activity Center
|
1:40-2:25 |
Announcements – Keynote
McKnight Auditorium
Hacking our Humanity: Biotechnology, Biohackers and the Edges of Discovery
Richard Thieme
|
2:30-3:15 |
Breakout
Building Your Sec Ops Use Case
McKnight Auditorium
Don Murdoch
Real Time Cyber Intelligence
Cone 111
Vince Crisler
CCAA Innovation in Cybersecurity Automation
Cone 112
Ehab Al-Shaer
|
3:15-3:30 |
Beverage Break – Networking
Lucas Room
|
3:35-4:15 |
Breakout
Deception Inception
Halton Reading Room
Abhishek Mehta
DDoS Attacks: Lesson learned from analyzing 10,000 incidents and a case study
Cone 111
Tin Zaw
The Continued Prevalence of People and Processes Over Technology
Cone 113
Blake Bommelje
|
3:35-4:15 |
Breakout Panel
McKnight Auditorium
Panel: Know Your Employees, Stop Insider Threats
Louis Lyons, Scott Shumate
|
4:20-4:55 |
CISO Closing Panel
McKnight Auditorium
Panel: Career Panel – Today’s Cybersecurity Careers Landscape
Timothy Bhatt, Hafid Elabdellaoui, Jim Maloney
|
4:55-5:00 |
Closing Session
McKnight Auditorium
Bill Chu
|