7:00-8:15 |
Registration and Breakfast
|
8:15-8:30 |
Introduction and Logistics
Dr. Bill Chu
|
8:30-9:30 |
Keynote - Mcknight auditorium
Mischel Kwon
Getting the Board's Buy in Through Social Metrics
|
9:30-9:45 |
Break/Networking
|
9:30-4:15 |
Capture the Flag
|
9:45-10:30 |
Breakout Sessions
Eric Docktor & Ken Beer
How to Think About Data Security in the Cloud - McKnight Auditorium
Sam Migues
Risk: They Can't Manage What They Don't Know About - Cone 210
Joel Amick & Scott Rodgers
Threat Hunting With Data Mining and Analytics - cone 112
Bojan Simic
What Works, What Doesn't in Upgrading and Implementing Cyber Security Technology - cone 111
Ethics Panel
Roger Callahan, Brian Cyprian, Matt Donato - cone 113
Briana McIntyre
The New Definition of Cybersecurity; How Organizations Save the Talent Deficit - cone 208
|
10:30-11:00 |
BREAK/NETWORKING
|
11:00-12:00 |
Keynote - mcknight auditorium
Chris Roberts
The Abyss is Waving Back
|
12:00-1:30 |
Lunch
Lunch Speaker: Sounil Yu
Understanding the Cybersecurity Landscape using the Cyber Defense Matrix - sac salons and food court
|
1:30-2:30 |
Announcements and Keynote - mcknight auditorium
Elena Kvochko
Talent is the Present and Future of Cybersecurity
|
2:30-3:15 |
BREAKOUT SESSIONS
Matthew Snyder
Industrial Security - Old Challenges / New Opportunities - mcknight auditorium
Wendy Nather
Denial of Trust: The New Attacks - cone 210
Privacy Panel
Allen O'Rourke, Christine Frye, Kim Fleming, Alysa Austin - cone 112
Nick Mistry
Addressing the Cloud Security Challenge - cone 111
Scott Hubert
The Rise of Machine Learning and Behavioral Analytics in Data Protection - cone 113
Unexpected and Unconventional - Yet Here We Are
Women In Cyber Panel
Ashley Harmon, Margaret White, Briana McIntyre, Ikran Hassan - cone 208
|
3:15-3:30 |
BREAK/NETWORKING
|
3:30-4:15 |
BREAKOUT SESSIONS
Jeff Greene
The Five Stages of (IOT) Grief - mcknight auditorium
Jeff Crume
Leveraging AI for Cyber Security - cone 210
Chris Nickerson
Getting Value from Testing, Not Just a Report - cone 112
Yongee Wang
Crytographic Currency, Blockchains, Smart Contract and Distributed Trust - cone 111
Ehab Al-Shaer
Automation of Cyber Threat Intelligence Analytics and Hunting - cone 113
Brandi Keough
Applying the Scientific Method to Cybersecurity Event Analysis - cone 208
|
4:20-5:00 |
Closing Session - mcknight auditorium
CISO Panel
Bill Chu, Jeremiah Grant, Ken Bailey, Andre Mintz
|