Catching the Blind Spots of Third Party Risk Manageme... 9:40am - 10:30am
Securing the Privileged Pathway - The Most Travelled... 10:40am - 11:30am
Fighting Next-Gen Target Business Email Compromise (B... 1:20pm - 2:10pm
Burning Down the Haystack 9:40am - 10:30am
The Future of Security Incident Response 10:40am - 11:30am
Security Thru Intel: Learning from other peoples mist... 1:20pm - 2:10pm
A View From the Front Lines: Current threat landscape... 9:40am - 10:30am
Artificial Intelligence for Everyone 10:40am - 11:30am
Securing Shadow IT and Office 365 1:20pm - 2:10pm
Transforming IoT Security Through Visibility 9:40am - 10:30am
The Dark Web's Increasing Influence on Insider Threat 10:40am - 11:30am
Proactive vs Reactive Incident Response: Hunting at y... 1:20pm - 2:10pm
Solving the Security and Compliance Crisis with Big D... 9:40am - 10:30am
Disrupting Credential-based Attacks 10:40am - 11:30am
Linux Servers: Why Native Security is Not Enough 1:20pm - 2:10pm
Opening Remarks
Opening Keynote - Lee Holms 8:30am - 9:30am
Lunch 11:30am - 12:10pm
Second Keynote - Chris Nickerson 12:10pm - 1:10pm
Final Keynote Speaker - Will Schroeder (@harmj0y) 2:20pm - 3:20pm
Closing Remarks / Giveaways 4:20pm - 4:45pm
Designing Security Policies to Enable Risk Assessment 9:40am - 10:30am
Mobile Security Threats 10:40am - 11:30am
Building and Improving an Effective Security Awarenes... 1:20pm - 2:10pm
Open-Source Intelligence (OSINT) Tips for Malware Inv... 9:40am - 10:30am
OSINT Basics for InfoSec 10:40am - 11:30am
Lockstepping the SDLC: A guide to securing your agile... 1:20pm - 2:10pm
Registration / Breakfast 7:30am - 8:20am
Break
Happy Hour! 3:20pm - 4:20pm