Agenda 2021
|
8:00-9:30 |
Exhibit Hall |
|
9:15-9:30 |
Introduction Videos |
|
9:30-10:00 |
Ransomware: A ‘Game-Changer’ for Cyber Insurance |
|
10:00-11:00 |
Cyber Insurance Panel – Did you know? |
|
10:00-11:00 |
Adapting to the new IT reality and modernizing security architecture around Zero Trust principles |
|
10:00-11:00 |
Making Security & Legal Best Friends |
|
10:00-11:00 |
Why MTTR Doesn’t Belong in a SOC |
|
10:00-11:00 |
Bizarre Call Detonates BazarLoader Malware |
|
10:00-11:00 |
Secure Cloud Engineering – Generation DevSecOps |
|
10:00-3:00 |
Capture the Flag presented by Lowe’s |
|
11:00-12:00 |
Zero Trust Challenge for Hybrid Cloud |
|
11:00-12:00 |
The Enterprise, Innovation and You |
|
11:00-12:00 |
Cyber Defenders, Trends and Predictions 2021 |
|
11:00-12:00 |
CWCT- Cybersecurity Workforce Development- Opportunity meets the need |
|
12:00-1:30 |
Exhibit Hall |
|
12:00-12:15 |
Cyber Strength & Stretch presented by Bank of America |
| 12:00-1:15 |
Women in Cybersecurity |
| 12:30-1:30 |
TIAA Cybersecurity Connections – LIVE Networking! |
|
1:30-2:30 |
Building a Global Cyber Rating – How to Objectively Rate Cyber Capabilities |
|
1:30-2:30 |
Ransomware Case Study: Tips to prepare for and avoid an attack |
|
1:30-2:30 |
How Zero Trust Architecture is Changing Cyber Security |
|
1:30-2:30 |
DevSecOps: Securing the Perpetual Motion Machine |
|
1:30-2:30 |
Updates on CIS Critical Control |
|
1:30-2:30 |
SMB Business Session: 2021 Cyber Threats and Trends & Pragmatic Cybersecurity |
|
2:30-3:30 |
CISO Panel |
|
2:30-3:30 |
SMB Business Session: Internal Threats and Trends in Cybersecurity for SMBs |
|
2:30-3:30 |
Threat Hunting Case Study |
|
9:00-10:00 |
Exhibit Hall |
|
9:30-5:00 |
AWS CyberJam |
|
10:00-10:30 |
Keynote |
|
10:30-11:00 |
Keynote |
|
11:00-11:30 |
Keynote: Security Operations in a Post-Pandemic World |
|
11:30-1:00 |
Exhibit Hall |
|
12:00-12:15 |
Cyber Strength & Stretch presented by Lowe’s |
|
1:00-2:00 |
Viewing Security Through the Eyes of an Attacker |
|
1:00-2:00 |
From API Information Leakage to Pwned AWS Accounts |
|
1:00-2:00 |
Down the rabbit hole: How attackers use complex attack chains to evade detection |
|
1:00-2:00 |
The Hunt for Cybersecurity Talent |
|
1:00-2:00 |
Models and experiments with Decentralized Finance (DeFi) over blockchains |
|
2:00-3:00 |
Operational Resilience from Ransomware Attacks in the Cloud |
|
2:00-3:00 |
SBOMs and CycloneDX |
|
2:00-3:00 |
Building a Foundation for Proactive and Persistent Risk Mitigation |
|
2:00-3:00 |
This is your Circus AND your Monkeys: Managing Supply Chain |
|
2:00-3:00 |
Protection of hardware – design and countermeasures for Side Channel Analysis |
|
2:00-3:00 |
Securing & Managing IoT Devices – Build a Strong PKI for IoT |
|
3:00-4:00 |
Ransomware 2021 – Anatomy of a DoppelPaymer Attack |
|
3:00-4:00 |
Cybersecurity Template: Best Practices for Reporting and Preparing for Cyber Incidents |
|
3:00-4:00 |
Cloud Native technologies: Security and Compliance |
|
3:00-4:00 |
Zero Trust Security: An Enterprise Guide |
|
3:00-4:00 |
Cybersecurity Research and Education at UNC Charlotte |
|
3:00-4:00 |
A Conversation with Seemantini Godbole, Lowe’s Executive VP & CIO |