2016 Agenda
7:30 AM to 8:15 AM - Registration and Breakfast

Location: Lucas Room

8:15 AM to 8:30 AM - Introduction and Logistics

Location: McKnight Auditorium

8:30 AM to 9:15 AM - Micro-virtualization:CPU-Enforced Security and Privacy for an Era of Cloud and Mobility

Job Title: Founder and CTO

Simon Crosby
Simon Crosby - Keynote

Organization: Bromium

Location: McKnight Auditorium

Presentation: Presentation: Micro-virtualization: CPU-enforced security & privacy for an era of cloud and mobility

Overview:

The rapid adoption of cloud computing has been paralleled by profound changes in end-user computing: Mobility, consumerization, and the “untrusted web” lead inexorably toward a stark reality: IT is losing control... read more

8:30 AM to 9:15 AM - The Challenge with Detecting Silent Exits
 ANTHONY BRADDY
Introduction by: Anthony Braddy

Job Title: Senior Principal Security Program Manager

Organization: Veracode

Location: Cone 110

Job Title: Vice President-Security Science Practise

cassio
Cassio Goldschmidt

Organization: Stroz Friedberg

Location: Cone 110

Presentation: Presentation: Dissecting Bitcoin Architecture and Security

Overview:

Bitcoin is not only a currency. It's a system, a platform and an invention. Many human activities that previously required centralized institutions or organizations to function as authoritative or trusted points... read more

Job Title: Machine Learning Engineer

Andrew Wicker
Andrew Wicker

Organization: Microsoft

Location: Cone 110

Presentation Title: Presentation: Machine Learning for Cloud Security - Challenges and Opportunities

Overview:

Developing signals that reliably detect security events in the cloud is a nontrivial task fraught with nuances between malicious and benign behavior. In order to make the leap from an uninteresting anomaly to an... Read more >>

Job Title: Principal Product Security Engineer

JOHN MELTON
John Melton

Organization: NetSuite

Location: Cone 110

Presentation Title: Presentation: Microservices Security

Overview:

Microservices have recently become a very popular technique for application development. The paradigm brings significant value for certain types of applications, and the community certainly seems to be trending in... Read more >>

9:15 AM to 9:30 AM - Break (Raffle drawings)

Location: Lucas Room

9:30 AM to 10:15 AM - Partnering with an Enterprise to assist with Managing a 3rd Party Supply Chain Management Program while also providing testing Services to Vendors in the Supply Chain

Job Title: Senior Principal Security Program Manager

 ANTHONY BRADDY
Anthony Braddy

Organization: Veracode

Location: Cone 210

Presentation: Presentation: Partnering with an Enterprise to assist with managing a 3rd Party Supply Chain Management Program while also providing testing services to vendors in the supply chain

Overview:

Managing the risk surrounding a 3rd party supply chain while providing testing services provides unique challenges. In particular, ensuring alignment of objectives and communications amongst the various Enterprise,... read more

Job Title: Vendor Application Security Testing Program Engagement Manager

Damien McCall

Organization: Wells Fargo

Location: Cone 210

Presentation Title: Presentation: Partnering with an Enterprise to assist with managing a 3rd Party Supply Chain Management Program while also providing testing services to vendors in the supply chain

Overview:

Managing the risk surrounding a 3rd party supply chain while providing testing services provides unique challenges. In particular, ensuring alignment of objectives and communications amongst the various Enterprise,... Read more >>

9:30 AM to 10:15 AM - Cloud Security and Mitigating Vulnerabilities

Job Title: Partner in the Charlotte Office of Hall Booth Smith, P.C.

Richard Sheinis

Organization: Hall Booth Smith

Location: Cone 112

Presentation: Presentation: Cloud Security and Mitigating Vulnerabilities

Overview:

As cloud adoption moves forward, privacy and security risks in application coding need to be recognized and addressed. This discussion will focus on lessons learned as new cloud solutions are becoming available with... read more

Job Title: Tony Ucedavelez, Founder and CEO

Tony Ucedavelez

Organization: Versprite

Location: Cone 112

Presentation Title: Presentation: Cloud Security and Mitigating Vulnerabilities

Overview:

As cloud adoption moves forward, privacy and security risks in application coding need to be recognized and addressed. This discussion will focus on lessons learned as new cloud solutions are becoming available with... Read more >>

9:30 AM to 10:15 AM - Advanced Security Analytics: Netflow for Incident Response

Job Title: Director of IT & Services

Tom Pore

Organization: Plixer

Location: Cone 111

Presentation: Presentation: Advanced Security Analytics: NetFlow for Incident Response

Overview:

Your organization is valuable and the cyber criminals know it. Malicious actors constantly make attempts to exploit users for privileged access to your enterprise network. The biggest challenge is revealing network... read more

9:30 AM to 10:15 AM - Cloud Security and Mitigating Vulnerabilities

Job Title: IT Security Analyst

Edson Sierra

Organization: Duke Energy

Location: Cone 112

Presentation: Presentation: Intelligence Driven Defense & Cyber Kill Chain

Overview:

Cyber threats are constantly evolving and becoming more frequent and sophisticated. While there are many traditional incident response methodologies, we will be focusing specifically on the Cyber Kill Chain (CKC)... read more

Job Title: IT Security Analyst

GUILLERMO TAIBO
Guillermo Taibo

Organization: Duke Energy

Location: Cone 112

Presentation Title: Presentation: Intelligence Driven Defense & Cyber Kill Chain

Overview:

Cyber threats are constantly evolving and becoming more frequent and sophisticated. While there are many traditional incident response methodologies, we will be focusing specifically on the Cyber Kill Chain(CKC)... Read more >>

9:30 AM to 10:15 AM - Dissecting Bitcoin Architecture

Job Title: Vice President-Security Science Practise

cassio
Cassio Goldschmidt

Organization: Stroz Friedberg

Location: McKnight Auditorium

Presentation: Presentation: Dissecting Bitcoin Architecture and Security

Overview:

Bitcoin is not only a currency. It's a system, a platform and an invention. Many human activities that previously required centralized institutions or organizations to function as authoritative or trusted points... read more

10:15 AM to 10:30 AM - Break (Raffle drawings)

Location: Lucas Room

10:30 AM to 11:15 AM - Network Defender First Principles

Job Title: CSO

rick howard
Rick Howard - Keynote

Organization: Palo Alto Networks

Location: McKnight Auditorium

Presentation: Presentation: Network Defender First Principles

11:15 AM to 11:30 AM - Competition Announcement

Location: McKnight Auditorium

11:30 AM to 5:00 PM - Job Fair

Location: Cone 208

11:30 AM to 12:15 PM - Intelligence Driven Defense and Cyber Kill Chain

Job Title: IT Security Analyst

Edson Sierra

Organization: Duke Energy

Location: Cone 112

Presentation: Presentation: Intelligence Driven Defense & Cyber Kill Chain

Overview:

Cyber threats are constantly evolving and becoming more frequent and sophisticated. While there are many traditional incident response methodologies, we will be focusing specifically on the Cyber Kill Chain (CKC)... read more

Job Title: IT Security Analyst

GUILLERMO TAIBO
Guillermo Taibo

Organization: Duke Energy

Location: Cone 112

Presentation Title: Presentation: Intelligence Driven Defense & Cyber Kill Chain

Overview:

Cyber threats are constantly evolving and becoming more frequent and sophisticated. While there are many traditional incident response methodologies, we will be focusing specifically on the Cyber Kill Chain(CKC)... Read more >>

11:30 AM to 12:15 PM - Stuck in The Middle With You

Job Title: Senior Software Security Engineer

Micah Williams

Organization: Oracle Communications

Location: Cone 111

Presentation: Presentation: Stuck in the Middle with You Security complexity in the telecommunications industry

Overview:

Telecommunications Service Providers manage the critical communications infrastructure that enables today’s advanced mobile networks providing consumers with an always connected user experience. Security concerns... read more

Job Title: Director, Product Security

James Peterman

Organization: Oracle Communications

Location: Break Room

Presentation Title: Presentation: Stuck in the Middle with You Security complexity in the telecommunications industry

Overview:

Telecommunications Service Providers manage the critical communications infrastructure that enables today’s advanced mobile networks providing consumers with an always connected user experience. Security concerns... Read more >>

Location: Cone 111

11:30 AM to 12:15 PM - Mobile Security and the CISO

Job Title: VP, GM, CISO

Sam Phillips

Organization: Samsung Business Services

Location: Cone 210

Presentation: Presentation: Mobility and Security

Overview:

Mobility has unique needs and requirements for security. This session will discuss what should be considered when implementing or rearchitecting mobility in an enterpise environment.

11:30 AM to 12:15 PM - CISO Panel: Career Advise and Workforce Panel

Job Title: Chief Information Security Officer

Tim Bhatt

Organization: Ally Financial

Location: McKnight Auditorium

Job Title: Principal, Commercial Consulting, Booz Allen Hamilton

Todd Inskeep

Organization: Booz Allen Hamilton

Location: McKnight Auditorium

Presentation Title: Panel Topic: CISO

Job Title: Vice President, Operations & Strategic Integration Initiatives

Shelley Westman
Shelley Westman - Keynote

Organization: IBM

Location: McKnight Auditorium

Presentation Title: Presentation: The New Era of Security

Overview:

Change isn’t coming. It’s already here. More devices. More access points. More valuable data in the cloud. In this new digital era, perimeter controls and traditional security practices are not enough to safeguard... Read more >>

Job Title: Managing Director

Roger Callahan

Organization: Information Assurance Advisory, LLC

Location: McKnight Auditorium

Presentation Title: Panel Topic: Cyber Intelligence

12:15 PM to 1:30 PM - Lunch

Location: Student Activity Center

1:30 PM to 2:30 PM - What If we Win?

Job Title: CISO

Dan Geer - Keynote

Organization: In-Q-Tel

Location: McKnight Auditorium

Presentation: Presentation: What If We Win?

Overview:

Let us consider, for the moment, that we solve the problem of cybersecurity. What would that look like? Is such an outcome really in the cards, or is the future more like the Hundred Years' War -- with an ebb... read more

2:30 PM to 3:15 PM - Think Your Mobile App is Secure? Think Again...

Job Title: Senior Solutions Architect

Igor Matlin

Organization: Checkmarx

Location: McKnight Auditorium

Presentation: Presentation: Think Your Mobile App Is Secure? Think Again...

Overview:

Secure coding is crucial when it comes to mobile applications. Unfortunately it seems that most applications are still exposing themselves to risks which can be mitigated by employing secure coding practices from the... read more

2:30 PM to 3:15 PM - Machine Learning for Cloud Security-Challenges and Opportunities

Job Title: Machine Learning Engineer

Andrew Wicker
Andrew Wicker

Organization: Microsoft

Location: Cone 210

Presentation: Presentation: Machine Learning for Cloud Security - Challenges and Opportunities

Overview:

Developing signals that reliably detect security events in the cloud is a nontrivial task fraught with nuances between malicious and benign behavior. In order to make the leap from an uninteresting anomaly to an... read more

2:30 PM to 3:15 PM - UNC Charlotte Security Research

Job Title: Professor and Director of Cyber Defense and Network Assurability Center (CyberDNA)

Ehab Al-Shaer

Organization: University of Charlotte at North Carolina

Location: Cone 112

Presentation: Presentation: UNC Charlotte Security Research

2:30 PM to 3:15 PM - Microservices Security

Job Title: Principal Product Security Engineer

JOHN MELTON
John Melton

Organization: NetSuite

Location: Cone 111

Presentation: Presentation: Microservices Security

Overview:

Microservices have recently become a very popular technique for application development. The paradigm brings significant value for certain types of applications, and the community certainly seems to be trending in... read more

3:15 PM to 3:30 PM - Break

Location: Lucas Room

3:30 PM to 4:15 PM - Monitoring Attack Surface Analysis to Secure DevOps Pipelines

Job Title: Principal of Denim Group, Ltd.

Dan Cornell

Organization: Denim Group

Location: Cone 111

Presentation: Presentation: Monitoring Attack Surface Analysis to Secure DevOps Pipelines

Overview:

A web application’s attack surface is the combination of URLs it will respond to as well as the inputs to those URLs that can change the behavior of the application. Understanding an application’s attack surface is... read more

3:30 PM to 4:15 PM - Panel: Cyber Intelligence

Job Title: Senior Manager | Cyber Risk and Controls

Jack Freund

Organization: TIAA

Location: McKnight Auditorium

Presentation: Presentation: Integrating Threat Intelligence into Cyber Risk Management

Overview:

This session will review a process for integrating threat intelligence data into Cyber Risk Management. Topics to be reviewed include normalized terminology, threat categorization, risk taxonomy, and measurement.... read more

Job Title: SVP, Cyber Threat Intelligence

Christopher Houser
Christopher Houser

Organization: Wells Fargo Corporation

Location: McKnight Auditorium

Presentation Title: Panel Topic: Cyber Intelligence

3:30 PM to 4:15 PM - Hunting in the Dark

Job Title: Chief Security Architect

Ryan Kazanciyan

Organization: Tanium

Location: Cone 210

Presentation: Presentation: "Hunting in the Dark"

Overview:

"Hunting" is a key phase of the incident response lifecycle that aims to identify, on a proactive basis, unknown threats lurking in an environment. In practice, many hunting teams focus on searching for... read more

4:15 PM to 5:00 PM - The New Era of Security

Job Title: Vice President, Operations & Strategic Integration Initiatives

Shelley Westman
Shelley Westman - Keynote

Organization: IBM

Location: McKnight Auditorium

Presentation: Presentation: The New Era of Security

Overview:

Change isn’t coming. It’s already here. More devices. More access points. More valuable data in the cloud. In this new digital era, perimeter controls and traditional security practices are not enough to safeguard... read more

4:15 PM to 5:00 PM - The New Era of Security

Job Title: Vice President, Operations & Strategic Integration Initiatives

Shelley Westman
Shelley Westman - Keynote

Organization: IBM

Location: McKnight Auditorium

Presentation: Presentation: The New Era of Security

Overview:

Change isn’t coming. It’s already here. More devices. More access points. More valuable data in the cloud. In this new digital era, perimeter controls and traditional security practices are not enough to safeguard... read more

5:15 PM to 6:15 PM - CISSP Reception

Location: Lucas Room