Agenda 2021
8:00-9:30 |
Exhibit Hall |
9:15-9:30 |
Introduction Videos |
9:30-10:00 |
Ransomware: A ‘Game-Changer’ for Cyber Insurance |
10:00-11:00 |
Cyber Insurance Panel – Did you know? |
10:00-11:00 |
Adapting to the new IT reality and modernizing security architecture around Zero Trust principles |
10:00-11:00 |
Making Security & Legal Best Friends |
10:00-11:00 |
Why MTTR Doesn’t Belong in a SOC |
10:00-11:00 |
Bizarre Call Detonates BazarLoader Malware |
10:00-11:00 |
Secure Cloud Engineering – Generation DevSecOps |
10:00-3:00 |
Capture the Flag presented by Lowe’s |
11:00-12:00 |
Zero Trust Challenge for Hybrid Cloud |
11:00-12:00 |
The Enterprise, Innovation and You |
11:00-12:00 |
Cyber Defenders, Trends and Predictions 2021 |
11:00-12:00 |
CWCT- Cybersecurity Workforce Development- Opportunity meets the need |
12:00-1:30 |
Exhibit Hall |
12:00-12:15 |
Cyber Strength & Stretch presented by Bank of America |
12:00-1:15 |
Women in Cybersecurity |
12:30-1:30 |
TIAA Cybersecurity Connections – LIVE Networking! |
1:30-2:30 |
Building a Global Cyber Rating – How to Objectively Rate Cyber Capabilities |
1:30-2:30 |
Ransomware Case Study: Tips to prepare for and avoid an attack |
1:30-2:30 |
How Zero Trust Architecture is Changing Cyber Security |
1:30-2:30 |
DevSecOps: Securing the Perpetual Motion Machine |
1:30-2:30 |
Updates on CIS Critical Control |
1:30-2:30 |
SMB Business Session: 2021 Cyber Threats and Trends & Pragmatic Cybersecurity |
2:30-3:30 |
CISO Panel |
2:30-3:30 |
SMB Business Session: Internal Threats and Trends in Cybersecurity for SMBs |
2:30-3:30 |
Threat Hunting Case Study |
9:00-10:00 |
Exhibit Hall |
9:30-5:00 |
AWS CyberJam |
10:00-10:30 |
Keynote |
10:30-11:00 |
Keynote |
11:00-11:30 |
Keynote: Security Operations in a Post-Pandemic World |
11:30-1:00 |
Exhibit Hall |
12:00-12:15 |
Cyber Strength & Stretch presented by Lowe’s |
1:00-2:00 |
Viewing Security Through the Eyes of an Attacker |
1:00-2:00 |
From API Information Leakage to Pwned AWS Accounts |
1:00-2:00 |
Down the rabbit hole: How attackers use complex attack chains to evade detection |
1:00-2:00 |
The Hunt for Cybersecurity Talent |
1:00-2:00 |
Models and experiments with Decentralized Finance (DeFi) over blockchains |
2:00-3:00 |
Operational Resilience from Ransomware Attacks in the Cloud |
2:00-3:00 |
SBOMs and CycloneDX |
2:00-3:00 |
Building a Foundation for Proactive and Persistent Risk Mitigation |
2:00-3:00 |
This is your Circus AND your Monkeys: Managing Supply Chain |
2:00-3:00 |
Protection of hardware – design and countermeasures for Side Channel Analysis |
2:00-3:00 |
Securing & Managing IoT Devices – Build a Strong PKI for IoT |
3:00-4:00 |
Ransomware 2021 – Anatomy of a DoppelPaymer Attack |
3:00-4:00 |
Cybersecurity Template: Best Practices for Reporting and Preparing for Cyber Incidents |
3:00-4:00 |
Cloud Native technologies: Security and Compliance |
3:00-4:00 |
Zero Trust Security: An Enterprise Guide |
3:00-4:00 |
Cybersecurity Research and Education at UNC Charlotte |
3:00-4:00 |
A Conversation with Seemantini Godbole, Lowe’s Executive VP & CIO |