Agenda

7:00-8:15

Registration and Breakfast

 

8:15-8:30

Introduction and Logistics

Dr. Bill Chu

8:30-9:30

Keynote - Mcknight auditorium

Mischel Kwon
Getting the Board's Buy in Through Social Metrics

9:30-9:45

Break/Networking

 

9:30-4:15

Capture the Flag

 

9:45-10:30

Breakout Sessions

Eric Docktor & Ken Beer
How to Think About Data Security in the Cloud - McKnight Auditorium

Sam Migues
Risk: They Can't Manage What They Don't Know About - Cone 210

Joel Amick & Scott Rodgers
Threat Hunting With Data Mining and Analytics - cone 112

Bojan Simic
What Works, What Doesn't in Upgrading and Implementing Cyber Security Technology - cone 111

Ethics Panel
Roger Callahan, Brian Cyprian, Matt Donato - cone 113

Briana McIntyre
The New Definition of Cybersecurity; How Organizations Save the Talent Deficit - cone 208

10:30-11:00

BREAK/NETWORKING

 

11:00-12:00

Keynote - mcknight auditorium

Chris Roberts
The Abyss is Waving Back

12:00-1:30

Lunch

Lunch Speaker: Sounil Yu
Understanding the Cybersecurity Landscape using the Cyber Defense Matrix - sac salons and food court

1:30-2:30

Announcements and Keynote - mcknight auditorium

Elena Kvochko
Talent is the Present and Future of Cybersecurity

2:30-3:15

BREAKOUT SESSIONS

Matthew Snyder
Industrial Security - Old Challenges / New Opportunities - mcknight auditorium

Wendy Nather
Denial of Trust: The New Attacks - cone 210

Privacy Panel
Allen O'Rourke, Christine Frye, Kim Fleming, Alysa Austin - cone 112

Nick Mistry
Addressing the Cloud Security Challenge - cone 111

Scott Hubert
The Rise of Machine Learning and Behavioral Analytics in Data Protection - cone 113

Unexpected and Unconventional - Yet Here We Are
Women In Cyber Panel
Ashley Harmon, Margaret White, Briana McIntyre, Ikran Hassan - cone 208

 

3:15-3:30

BREAK/NETWORKING

 

3:30-4:15

BREAKOUT SESSIONS

Jeff Greene
The Five Stages of (IOT) Grief - mcknight auditorium

Jeff Crume
Leveraging AI for Cyber Security - cone 210

Chris Nickerson
Getting Value from Testing, Not Just a Report - cone 112

Yongee Wang
Crytographic Currency, Blockchains, Smart Contract and Distributed Trust - cone 111

Ehab Al-Shaer
Automation of Cyber Threat Intelligence Analytics and Hunting - cone 113

Brandi Keough
Applying the Scientific Method to Cybersecurity Event Analysis - cone 208

4:20-5:00

Closing Session - mcknight auditorium

CISO Panel
Bill Chu, Jeremiah Grant, Ken Bailey, Andre Mintz