Skip to main content
Browse Schedule
Full Schedule
Browse by Date
Saturday, October 26, 2019
Sunday, October 27, 2019
Monday, October 28, 2019
Tuesday, October 29, 2019
Wednesday, October 30, 2019
Browse by Title
Browse by Speakers
Browse by Track
Keyword Search
Student Recommended
Sessions
Conference App
My Schedule
Login required
Evaluations
Login required
Login
Toggle navigation
Home
Browse Schedule
Full Schedule
Browse by Date
Saturday, October 26, 2019
Sunday, October 27, 2019
Monday, October 28, 2019
Tuesday, October 29, 2019
Wednesday, October 30, 2019
Browse by Title
Browse by Speakers
Browse by Track
Keyword Search
Student Recommended
Sessions
Conference App
My Schedule
Login required
Evaluations
Login required
Please Be Advised: Please note that favoriting a session does not mean you have reserved a seat. All sessions are first come, first serve onsite. Pre-Conference Trainings and Workshops require pre-registration.
Browse by Track
Browse by Track
Type here to filter the list
Application Security/Software Assurance
Monday, Oct 28
9:45 am
Security Assurance with Open Source Packages
Location: Southern 5
Gail-Joon Ahn – Samsung Research
Monday, Oct 28
11:00 am
Three Levels of complexity: Threat Modeling of Containerized Applications
Location: Southern 5
Elena Kravchenko, MA, CISSP – Micro Focus
Monday, Oct 28
4:30 pm
The Case for DevSecOps—And Recognizing the 'Mine, Mine, Mine' Paradigm
Location: Southern 5
Caroline E. Saxon, CISSP, CCME, KCP – TSYS
Tuesday, Oct 29
10:30 am
Don’t Let Your Products and Customers be Victims of an Insecure Supply Chain
Location: Southern 5
Kyle Brunell – EY; Steve Currie – EY; James Deluccia – Honeywell
Tuesday, Oct 29
1:45 pm
Product Security Shouldn't be Painful
Location: Southern 5
Wim Remes – Wire Security bvba
Tuesday, Oct 29
3:00 pm
Securing Modern API and Microservices-based Applications by Design
Location: Southern 5
Farshad Abasi, CISSP – Forward Security Inc.
Wednesday, Oct 30
8:30 am
Secure Software Engineering for Cars: Practical Insights and Success Factors
Location: Southern 5
Florian Stahl, MS – AVL Software & Functions
Wednesday, Oct 30
9:45 am
From The Start: Infuse Security Into Requirements Architecture and Design
Location: Southern 5
Thomas P. Scanlon – Carnegie Mellon University
Wednesday, Oct 30
11:00 am
In God We Trust. Everybody Else Bring Data - Secure Software Development's "Vital few" Metrics
Location: Southern 5
Girish Seshagiri – Ishpi Information Technologies, Inc.; John R. Marien – The MITRE Corporation
Wednesday, Oct 30
1:45 pm
Secure Application Lifestyle
Location: Southern 5
David Walker, BS, CSSLP – AgileThought, Inc
Wednesday, Oct 30
3:00 pm
Building Secure Software Takes a Champion
Location: Southern 5
Altaz Valani – Security Compass
Cloud Security
Monday, Oct 28
9:45 am
Containers in the Cloud: Applied Threat Modeling
Location: Northern D+DE Corridor
Richard Tychansky
Monday, Oct 28
11:00 am
Compliance by Design: How to Build in the Public Cloud
Location: Northern D+DE Corridor
Matthew Wells – Shujinko
Monday, Oct 28
3:15 pm
Critical Elements of Application and Data Security in an AWS Cloud
Location: Northern D+DE Corridor
Deepak Sharma – Goldman Sachs & Co.; Barry McConnell – Goldman Sachs & Co.
Monday, Oct 28
4:30 pm
Today's Cloud and Preparing for Tomorrow's
Location: Northern D+DE Corridor
Shawn A. Harris, CISSP-ISSAP, CCSP – Starbucks Coffee Company; Jon-Michael C. Brook – Guide Holdings, LLC; John Yeoh – Cloud Security Alliance; Randall Brooks – Raytheon; Kris Rides – Tiro Security
Tuesday, Oct 29
10:30 am
Cloud Autonomy: Advancing Levels of Security
Location: Northern D+DE Corridor
John Yeoh – Cloud Security Alliance
Tuesday, Oct 29
1:45 pm
Embracing Zero Trust (When You Aren't the World's Largest Internet Company)
Location: Northern D+DE Corridor
James Plouffe – MobileIron
Tuesday, Oct 29
3:00 pm
Serverless Computing: Top Security Challenges and How to Mitigate Them
Location: Northern D+DE Corridor
Tim Sills, CISSP, CISA, CISM, QSA, AWS SA, Security-Specialty – AWS SAS, LLC.
Tuesday, Oct 29
4:15 pm
AWS Authority to Operate (ATO) - Compliance as Code
Location: Northern D+DE Corridor
Tim Sandage, AWS, CISSP, CRISC, CCSK – Amazon Web Services
Wednesday, Oct 30
8:30 am
Don't Become the Next Headline: API Security for Security Executives
Location: Northern D+DE Corridor
Andrew Whelchel – Okta
Wednesday, Oct 30
9:45 am
Hybrid Clouds: Security is Not What it SIEMs
Location: Northern D+DE Corridor
Richard Tychansky
Wednesday, Oct 30
11:00 am
What You Need to Know About Securing Cloud-Native and Kubernetes
Location: Northern D+DE Corridor
Travis Jeppson – Kasten
Wednesday, Oct 30
1:45 pm
ISC2’s Digital Transformation – “DETE”
Location: Northern D+DE Corridor
Bruce W. Beam, CISSP, CISM, MBA, MS IT – (ISC)2; Wesley Simpson, MSM – (ISC)2; Brandon Dunlap – Brightfly, Inc.
Wednesday, Oct 30
3:00 pm
Hacking the Cloud: Learning the Nuances of Cloud Penetration Testing
Location: Northern D+DE Corridor
Mike Weber – Coalfire
Cutting Edge
Monday, Oct 28
9:45 am
Honeypots and Machine Learning: An Effective Security Tag Team
Location: Southern 4
David S. Read, CISSP – infuzIT, LLC; Xinyi Gu – infuzIT, LLC
Monday, Oct 28
11:00 am
DFIR Redefined: Deeper Functionality for Investigators with R
Location: Southern 4
Russ McRee – Microsoft
Monday, Oct 28
3:15 pm
Security Orchestration with Software-Defined Perimeter and Blockchain
Location: Southern 4
Rajeevan Kallumpuram, CISSP, CISM – Reliance Industries Limited
Monday, Oct 28
4:30 pm
Controlling 5G Networks: Enter the World of Cyber World War
Location: Southern 4
Richard Tychansky
Tuesday, Oct 29
10:30 am
Security.txt: Responsible Disclosure for the Next Generation
Location: Southern 4
Favian E. Raygoza, MS, CISSP – Bright Health
Tuesday, Oct 29
1:45 pm
CANCELLED - iRPA, or Intelligent Robotics Process Automation—Tips, Tricks and Pitfalls to Avoid
Location: Southern 4
Harvey H. Nusz – Capgemini
Tuesday, Oct 29
3:00 pm
Blockchain of Evidence
Location: Southern 4
Jeff Neithercutt, MA, CISSP – Blockchain Of Evidence
Tuesday, Oct 29
4:15 pm
Dark Web Threats: From Technical Proof-of-Concepts to Tactical Weapons
Location: Southern 4
Richard Tychansky
Cyber Crime
Tuesday, Oct 29
10:30 am
CANCELLED: Telephony: The Forgotten Network Threat
Location: Northern E1
Jimmy D. Reeves – Gateway Security, LLC
Tuesday, Oct 29
1:45 pm
Unsupported Apps: What Can be Done?
Location: Northern E1
Alexis Brignoni – US Department Of Justice
Tuesday, Oct 29
3:00 pm
From Villains to Heroes: The Hacker Evolution
Location: Northern E1
Alex Rice – HackerOne; Peter Yaworski – Shopify; Tanner Emek – Hacker; Johnny Nipper
Tuesday, Oct 29
4:15 pm
Shot Fired From 5,000 Miles
Location: Northern E1
Tim Jensen, CISSP – BSI Group America Inc.; Willy Fabritius – BSI Group America Inc.
Wednesday, Oct 30
8:30 am
Legal Qualifications of a Testifying Digital Forensic Expert Witness
Location: Northern E1
Herbert Joe – Law Office of Herbert Joe
Wednesday, Oct 30
9:45 am
Breaking and Entering: Emulating the Digital Adversary in 2019
Location: Northern E1
Robert Thompson – Department of Homeland Security; Rob Karas – Department of Homeland Security
Wednesday, Oct 30
11:00 am
Schrödinger's Vulnerability - Chasing Exploitability, Not Vulnerability
Location: Northern E1
Alex Haynes, CISSP, CEH, CHFI, PCIP, ISO27001,ISO22301 – Cheshire Datasystems
Wednesday, Oct 30
1:45 pm
Insider Threat: A Review of Electronic Surveillance Threats and the Countermeasures
Location: Northern E1
Jimmy D. Reeves – Gateway Security, LLC
Wednesday, Oct 30
3:00 pm
Fraud—The Nexus of Insiders, Outsiders and Cyber
Location: Northern E1
Robert Rudloff, CISSP-ISSMP, CCSP, PMP – RubinBrown; Beth Womersley, CPA CRMA – RubinBrown
Featured Sessions
Monday, Oct 28
9:45 am
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Location: Northern BC
Jennifer Steffens, CEO – IOActive; Ericka Chickowski – Digirupt.io; Jennifer Minella – Carolina Advanced Digital, Inc.; Karen Worstell – W Risk Group; Manju Mude – Verizon Media
Monday, Oct 28
11:00 am
The History of the Future of Cybersecurity Education
Location: Northern BC
Winn Schwartau – The Security Awareness Company
Monday, Oct 28
3:15 pm
Redefining the Approach to Mobile Security (And Why It Works)
Location: Northern BC
Eugene Liderman – Google; Mike Burr – Google
Monday, Oct 28
4:30 pm
We Take Security Seriously
Location: Northern BC
Javvad Malik, CISSP – KnowBe4
Tuesday, Oct 29
8:00 am
Making Cybersecurity Personal
Location: Pacific Hall
Patrick T. Craven – Center for Cyber Safety and Education
Tuesday, Oct 29
10:30 am
Machine Learning : An Attacker's Perspective
Location: Northern BC
Glen Taylor – The Walt Disney Co.; Matt Estes – The Walt Disney Company; Doug Hill – The Walt Disney Company
Tuesday, Oct 29
1:45 pm
Trends in Cloud Security: Where We're Going, We Don't Need Roads
Location: Northern BC
Liz Tesch – Microsoft
Tuesday, Oct 29
3:00 pm
Cybersecurity Tips, Tools and Techniques for Every CISSP—Updated for 2019
Location: Northern BC
Ronald Woerner, CISSP – Bellevue University
Tuesday, Oct 29
4:15 pm
The Future of Digital Identity in the Era of Digital Transformation
Location: Northern BC
Zulfikar Ramzan, PhD – RSA Security
Wednesday, Oct 30
8:30 am
The Automation Quandary
Location: Northern BC
Michael S. LeLand – McAfee
Wednesday, Oct 30
9:45 am
Gaming the System—Anticipating the Incidence of Incidents
Location: Northern BC
Seth E. Jaffe, JD, CIPP/US, CBCP – The Law Office of Seth E. Jaffe; Clint Bodungen – ThreatGEN
Wednesday, Oct 30
11:00 am
What You Need to Know About Global Privacy Laws, Cyber Cases and the Changing Landscape
Location: Northern BC
Adriana Sanford, JD, dual LLM – CNN Español Analyst/ Contributor
Wednesday, Oct 30
1:45 pm
Getting Started With SDL
Location: Northern BC
Steven B. Lipner, CISSP – SAFECode
Wednesday, Oct 30
3:00 pm
Preparing for Cyber War: Learnings from Responding to Disruptive Breaches
Location: Northern BC
Charles Carmakal – Mandiant; Jeremy Koppen – Mandiant
Governance, Risk and Compliance
Monday, Oct 28
9:45 am
Creating a Compliance Roadmap: One Company's Journey
Location: Southern 1
Heather L. Smee – Westfield
Monday, Oct 28
11:00 am
Ethics Dilemmas Information Security Professionals Face: Do YOU Deal with Them in the Right Way?
Location: Southern 1
Biljana Cerin, CISSP – Ostendo Consulting; Wim Remes, CISSP – NRJ Security; William H. Murray, CISSP; William K. Campbell, CISSP – Predictable Solutions, LLC; Richard Nealon, CISSP-ISSMP, SSCP, CISA, CISM, SCF – (ISC)2 Ethics Committee
Monday, Oct 28
3:15 pm
Make Your Organization 10% More Secure
Location: Southern 1
Andrew Hay, CISSP – Lares
Monday, Oct 28
4:30 pm
Lightning Round—Everything a CISSP Needs to Know About the Cyber Legal Landscape
Location: Southern 1
Monique Ferraro – Hartford Steam Boiler Insurance and Inspection Company; Sean Hoar – Lewis Brisbois; Karen Painter Randall, MPA, JD – Connell Foley, LLP; Dianna Daghir McCarthy – Winget Spadafora & Schwartzberg, LLP
Tuesday, Oct 29
10:30 am
Listen to What She Has to Say. . .
Location: Southern 1
Pamela Fusco – CBG; Tara Janos – AbbVie pharmaceutical
Tuesday, Oct 29
1:45 pm
Yes, The Auditors Have Arrived! Assessment and Assurance of Cybersecurity Controls
Location: Southern 1
Tanya Tipper-Luster, CISSP, CISA, PMP – Wyndham Destinations; Robert Ryba, CPA, CISA – Wyndham Destinations; Ethan Strayer – Information Technology
Tuesday, Oct 29
3:00 pm
Get Paid or Get Stiffed: Understanding Your Cyber Insurance Policy
Location: Southern 1
Seth E. Jaffe, JD, CIPP/US, CBCP – The Law Office of Seth E. Jaffe; Lisa M. Angelo, CIPP/US, CIPM, PLS – Angelo Law Firm PLLC
Tuesday, Oct 29
4:15 pm
Automating Compliance Evidence for Small Businesses
Location: Southern 1
Billy T. Anglin – ARES CYBER DEFENSE LLC
Wednesday, Oct 30
8:30 am
Mechanized Security Architecture: Using ESA to Drive Strategy
Location: Southern 1
Selvan Snow, CISSP, CCSP – Snow Group Technologies
Wednesday, Oct 30
9:45 am
Global Factors Driving Data Privacy Regulation
Location: Southern 1
Andrea Little Limbago – Virtru
Wednesday, Oct 30
11:00 am
Transformational Governance: Guiding Your Way to a Secure Digital Transformation
Location: Southern 1
Andrew Neal – TLS; Jennifer Sosa – TLS
Wednesday, Oct 30
1:45 pm
A 360˚ Approach to Securing the Cloud - Total Visibility and Comprehensive Security for Cloud workloads and infrastructure
Location: Southern 1
Sean Nicholson – Qualys
Wednesday, Oct 30
3:00 pm
Multi-Dimensional Risk Management
Location: Southern 1
Lloyd Diernisse, CISSP, CCSP, LSSBB, PMP, CSM, CMMI-A, ITIL-F – Consultant
Human Factors
Monday, Oct 28
9:45 am
Creating a Human Security Officer
Location: Northern A1-2
Ira Winkler – Secure Mentem; Adriana Antunes – Digital Law Commission, Brazilian Bar Association (DF)
Monday, Oct 28
11:00 am
Creating Scalable, Sustainable Cybersecurity for Any-Sized Corporation
Location: Northern A1-2
Gordon Rudd, CISSP – Venminder
Monday, Oct 28
3:15 pm
Capture the Flag Employee Retention Through Cyber Training
Location: Northern A1-2
Randall Brooks – Raytheon
Monday, Oct 28
4:30 pm
STOP! Don't Post That Job Description Yet (Or, How to Build Your Security Team the Right Way)
Location: Northern A1-2
Dan Waddell – Zeneth Technology Partners
Tuesday, Oct 29
10:30 am
Fortnite and Behaviorism: Building Effective Security Awareness Strategies
Location: Northern A1-2
Shayla Treadwell, PhD(c), GSLC – ECS Federal
Tuesday, Oct 29
1:45 pm
When Technology Isn’t Enough to Keep Families Safe
Location: Northern A1-2
Patrick T. Craven – Center for Cyber Safety and Education; Reynold Hioki, CISSP – State of Hawaii; Christopher Schurman, CISSP – Atos; Derin Beechner, CISSP – Black & Veatch
Tuesday, Oct 29
3:00 pm
When My Life Went to Hell—What I Learned about Risk
Location: Northern A1-2
Glenn Leifheit – Microsoft Corp.
Tuesday, Oct 29
4:15 pm
The State of Cybersecurity Careers
Location: Northern A1-2
Deidre Diamond – CyberSN and Brainbabe
Wednesday, Oct 30
8:30 am
Purple Teaming—Integrating Offensive and Defensive Cyber Ops
Location: Northern A1-2
Robert Armstrong – Mathan Cyber Security LLC
Wednesday, Oct 30
9:45 am
STEAM— Why Not? One Year Later.
Location: Northern A1-2
Deidre Diamond – CyberSN and Brainbabe; Sarah B. Lee – Mississippi State University; Crystal Williams – Women's Society of Cyberjutsu; Anna Wan, Ph.D. – University of Southern Mississippi
Wednesday, Oct 30
11:00 am
The Myth of the So-Called Talent Gap
Location: Northern A1-2
William K. Campbell, CISSP – Predictable Solutions, LLC
Wednesday, Oct 30
1:45 pm
Your Security Awareness Training has Bombed – Now What?
Location: Northern A1-2
Charles Gaughf, CISSP, SSCP, CCSP – (ISC)2; Sandy Mills-Afford – AliveTek Inc.
Wednesday, Oct 30
3:00 pm
Strategic Cyber: Getting the Board On Board
Location: Northern A1-2
Charles Platt – Bitscope Consulting; Caitlin Durkovich – Toffler Associates
ICS/Critical Infrastructure
Wednesday, Oct 30
8:30 am
CANCELLED: Developing Secure IoT Devices for Today and Tomorrow
Location: Southern 4
Graham Speake – Accenture
Wednesday, Oct 30
8:30 am
The Changing Cyber Ecosystem
Curtis M. Keliiaa, CISSP – Sandia National Laboratories
Wednesday, Oct 30
9:45 am
IT and OT Security—It Takes Two to Secure
Location: Southern 4
Elad Ben-Meir
Wednesday, Oct 30
11:00 am
Making People and Process the Main Focus of Industrial Cybersecurity Risk Strategy
Location: Southern 4
Kristin M. Demoranville – Wipro; Stuart A. King, MBA CISSP MinstISP – Wipro
Wednesday, Oct 30
1:45 pm
Protection of Information in Evolving Infrastructure Services
Location: Southern 4
Curtis M. Keliiaa, CISSP – Sandia National Laboratories
Wednesday, Oct 30
3:00 pm
CANCELLED - Securing Industry 4.0
Location: Southern 4
Geoffrey E. Gates, CISSP, MBA – Lockheed Martin
Identity & Access Management
Monday, Oct 28
9:45 am
Avoid Your Next Breach by Effectively Managing Privileged Access
Location: Asia 5
Deepak Sharma – Goldman Sachs & Co.; Barry McConnell – Goldman Sachs & Co.
Monday, Oct 28
11:00 am
Building a Modern, Automated and Scalable Identity and Access Management Platform
Location: Asia 5
Ben Waugh, BE – Redox Inc
Monday, Oct 28
3:15 pm
Account vs. Identity: Who b268eb1a-4838-11e9-8646-d663bd873d93 Really Is
Location: Asia 5
Erik Von Geldern – FXCM; Shawn A. Harris, CISSP-ISSAP, CCSP – Starbucks Coffee Company; John Carnes – Anthem, Inc; Brandon Dunlap – Brightfly, Inc.
Monday, Oct 28
4:30 pm
Context Based Access Control: A Step Beyond RBAC and ABAC
Location: Asia 5
Roney Banerjee, CISSP CCSP CISA PMP – Castling LLC; Myron Reubendale, MBA, PMP – Collaborative Solutions, Inc.
Tuesday, Oct 29
10:30 am
Those Old Rules for Passwords—Gone
Location: Asia 5
Hoyt Kesterson, CISSP, CISA, QSA – Avertium; Ralph S. Poore, CISSP, CISA, PCIP, CFE, CHS-III – PCI Security Standards Council
Tuesday, Oct 29
1:45 pm
The No. 1 Cybersecurity Project For Every Enterprise and CISO: Privileged Access Management
Location: Asia 5
Tariq Shaikh, CISSP,PMP,CSM – CVS Health
Tuesday, Oct 29
3:00 pm
Me and My Mobile Device: A New Approach for Strong Multidimensional Authentication
Location: Asia 5
Sarbari Gupta, MS, PhD, CISSP, CISA – Electrosoft Services, Inc.
Internet of Things
Monday, Oct 28
9:45 am
Secure Those Droids You Are Looking for Faster than You Can Read This
Location: Northern E1
Andrew Whelchel – Okta
Monday, Oct 28
11:00 am
The IoT Invasion: It's in Your Homes, It's in Your Companies
Location: Northern E1
John Carnes – Anthem, Inc; Selvan Snow, CISSP, CCSP – Snow Group Technologies; Erik Von Geldern – FXCM
Monday, Oct 28
3:15 pm
IoT Gone Wild: The Coming of Age of IoT Botnets.
Location: Northern E1
Kevin McNamee – Nokia
Monday, Oct 28
4:30 pm
CANCELLED: IoT: Understanding and Addressing the Unknown Threat
Location: Northern E1
Srinivas Mukkamala, PhD – RiskSense
Wednesday, Oct 30
8:30 am
Cyber Physical Security: Addressing IoT Risks
Location: Northern E4
Michael Raggo – 802 Secure, Inc.
Wednesday, Oct 30
9:45 am
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
Location: Northern E4
Curtis Simpson – Armis
Wednesday, Oct 30
11:00 am
Adapt your cybersecurity and manufacturing approach to the explosive growth of Industrial IoT!
Location: Northern E4
Didier Lesteven – WALLIX
Wednesday, Oct 30
1:45 pm
Demystifying Connected Device Security Legislation: Practical Advice for Non-lawyers
Location: Northern E4
Kyle Brunell – EY; Del Thornton – Ernst & Young LLP
Wednesday, Oct 30
3:00 pm
Defining the Threats: FitBits, Door Locks and Hacking, Oh My!
Location: Northern E4
Thomas Graham – CynergisTek; Cory Blacketer – CynergisTek
Keynote
Monday, Oct 28
8:30 am
Opening Keynote: Captain "Sully" Sullenberger
Location: Pacific Hall
Tuesday, Oct 29
9:00 am
Keynote: Catherine Price
Tuesday, Oct 29
12:00 pm
Luncheon Keynote: Erik Wahl
Location: Pacific Hall
Wednesday, Oct 30
5:30 pm
Closing Keynote: ADM William H. McRaven, USN (Ret.)
Location: Pacific Hall
Personal & Career Development
Monday, Oct 28
9:45 am
Stop and Smell the Learning Roses
Location: Southern 3
Mirtha Collin – (ISC)2; James Altman – Jackrabbit Learning Experience; Jason Gorman – Jackrabbit Learning Experience; Chris Castaldo – Dataminr
Monday, Oct 28
11:00 am
Infosec Rock Star: Accelerate Your Career By Building Critical Professional Skills
Location: Southern 3
Ted Demopoulos – Demopoulos Associates
Monday, Oct 28
3:15 pm
Cybersecurity Officers: Preparing for the Dash—R. I. P.
Location: Southern 3
Derrick A. Butts, CISSP, ITILv3 – Truth Initiative
Monday, Oct 28
4:30 pm
CANCELLED: Cyber Workforce 2.0—Attracting Diverse Student Interest Early (Grades K-12)
Location: Southern 3
Elizabeth Farrell, MBA, CISSP – Northrop Grumman Corporation
Tuesday, Oct 29
10:30 am
How to Build Your Security with Use Cases
Location: Southern 3
Erik Von Geldern – FXCM; John Carnes – Anthem, Inc; Shawn A. Harris, CISSP-ISSAP, CCSP – Starbucks Coffee Company; Brandon Dunlap – Brightfly, Inc.
Tuesday, Oct 29
1:45 pm
Be an Inspirational Coach, Not an Oppressive Security Executive
Location: Southern 3
Andrew Hay, CISSP – Lares
Tuesday, Oct 29
3:00 pm
Building and fostering a Security Awareness Ambassador Program (that gets results!)
Location: Southern 3
Tina M. Meeker, CISSP, CIPP/US – Beacon Information Security LLC; Chrysa Freeman, MBA – Code42
Tuesday, Oct 29
4:15 pm
After the Breach: How to Get Through It with Your Sanity and Health
Location: Southern 3
Chuck McGann, MBA – The McGann Group, LLC.; Diana Contesti – DL Consulting; Glenn Leifheit – Microsoft Corp.
Wednesday, Oct 30
8:30 am
From Surviving to Thriving as a Woman in Cybersecurity
Location: Southern 3
Sandy Silk, MA, CISSP – Harvard University
Wednesday, Oct 30
9:45 am
(JM)
2
and the Evangelist Framework
Location: Southern 3
James R. McQuiggan, CISSP – KnowBe4; Javvad Malik, CISSP – KnowBe4
Wednesday, Oct 30
11:00 am
The Problem With Diversity and Inclusion In Cybersecurity—We Can Fix It.
Location: Southern 3
Aric K. Perminter – Lynx Technology Partners, Inc.; Julian Waits – Devo, Inc.; Larry Whiteside – ICMCP; Amanda Honas-Frias – Cisco - Duo Security; David Elcock – ICMCP
Wednesday, Oct 30
1:45 pm
Navigating the Career Maze—Where Do I Go Next?
Location: Southern 3
Rob Ayoub – FireEye; Sharon Smith, CISSP, CCISO – Verizon; Deidre Diamond – CyberSN and Brainbabe; Erik Von Geldern – FXCM; John Esparza, CISSP, ISSAP – Schneider Electric
Wednesday, Oct 30
3:00 pm
CISO: Your First 90 Days
Location: Southern 3
William K. Campbell, CISSP – Predictable Solutions, LLC
Privacy
Monday, Oct 28
9:45 am
GDPR: A Year on the Data Protection Rollercoaster
Location: Northern E3
James Mackay, CISSP – Markel Corporation
Monday, Oct 28
11:00 am
Defending Impossible Risk Vectors: Human Frailty, Curiosity, and People-centric Risks
Location: Northern E3
James Sheldrake – Egress Software Technologies
Monday, Oct 28
3:15 pm
'And the Sky is Grey': Guidance to Prevent California's Privacy Laws from Becoming a Nightmare
Location: Northern E3
Jennifer Sosa – TLS
Monday, Oct 28
4:30 pm
Creating a Privacy Framework
Location: Northern E3
Harvey H. Nusz – Capgemini
Tuesday, Oct 29
10:30 am
What the California Consumer Privacy Act Means For Your Security Program
Location: Northern E3
Scott Giordano – Spirion
Tuesday, Oct 29
1:45 pm
CANCELLED: Building trust in an age of AI and data science #TheMoralCompass
Location: Northern E3
Ashwin Krishnan – UberKnowledge
Tuesday, Oct 29
3:00 pm
From Katz to Carpenter: How SCOTUS Views Evolving Technology and Privacy
Location: Northern E3
Herbert Joe – Law Office of Herbert Joe
Tuesday, Oct 29
4:15 pm
A Sensible Approach to Reasonable Security Measures under Data Privacy Regulations
Location: Northern E3
John Bailey – St. Jude Children’s Research Hospital; Michelle Caswell – Coalfire
Wednesday, Oct 30
8:30 am
AI and Privacy: Intersection of Innovation and Regulation
Location: Northern E3
Anjali Gugle, M.S. in Computer Science – Cisco Systems
Wednesday, Oct 30
9:45 am
Legal, IT or Business—Who is Breaking the Personal Data Protection Rules??
Location: Northern E3
Biljana Cerin, CISSP – Ostendo Consulting
Wednesday, Oct 30
11:00 am
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Location: Northern E3
Matthew Karnas – Sila
Wednesday, Oct 30
1:45 pm
Data Protection: Your New Discipline of Data Privacy + Information Security
Location: Northern E3
Scott Giordano – Spirion; Gabriel Gumbs – Spirion
Wednesday, Oct 30
3:00 pm
Operationalizing Privacy Regulation in Connected Ecosystems
Location: Northern E3
Robert Otten – DLA Piper
Regulation
Wednesday, Oct 30
8:30 am
The PCI Dream Team: Solving the Biggest PCI DSS Nightmares
Location: Northern E2
Ben Rothke, CISSP – Tapad; Jeff B. HALL – Online Business Systems; Arthur B. Cooper, Jr., MA, CISA, CEH, CISSP, SEC+, PCIP, PCI QSA – NuArx, Inc.; David Mundhenk, CISSP PCIP – Herjavec Group:
Wednesday, Oct 30
9:45 am
DLP Sucks and Why You Should Use It
Location: Northern E2
John Orleans, CISSP – Mesirow Financial
Wednesday, Oct 30
11:00 am
Behind the Text: Laws on Data Privacy, Consumer Rights and Cybersecurity, Deconstructed
Location: Northern E2
Jamal Hartenstein, JD, CGEIT, CISSP, PMP, ITIL, CSM, MCP, Network+, Security+, A+ – KAI Partners
Wednesday, Oct 30
1:45 pm
The 8 Questions a Judge Will Ask You After a Data Breach
Location: Northern E2
Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR – The DoCRA Council; Aaron DeMaster – Rexnord Corp.
Wednesday, Oct 30
3:00 pm
Using Chaos Engineering to Build Resilient Cloud Security
Location: Northern E2
Josh Stella – Fugue; Ricardo Green – Fugue
Security Automation
Monday, Oct 28
9:45 am
Managing Security in the Small Client MS[S]P Environment
Location: Northern E2
Michael D. Weisberg – Garnet River, LLC
Monday, Oct 28
11:00 am
Adopting An Automation-First Strategy for Identity and Access Management
Location: Northern E2
Bryan Christ – Hitachi ID
Monday, Oct 28
3:15 pm
Ethical Bias in AI-Based Security Systems: The Big Data Disconnect
Location: Northern E2
Winn Schwartau – The Security Awareness Company
Monday, Oct 28
4:30 pm
CANCELLED: The Impact of Machine Learning on Cybersecurity
Location: Northern E2
Chuck Easttom – Capitol Technology University
Tuesday, Oct 29
10:30 am
DevSecOps Automation: Can Security be Fully Automated?
Location: Northern E2
Gamini Bulumulle, MSE, PhD – InfoTechnology, Inc.
Tuesday, Oct 29
1:45 pm
Simplify Compliance Through Automation - A Panel Discussion
Location: Northern E2
Tim Sandage, AWS, CISSP, CRISC, CCSK – Amazon Web Services; Matt Jordan – JHC Technology Inc.; Kathleen Patentreger – Center for Internet Security (CIS); Avani Desai – Schellam & Company; Gary G. Daemer – Infusion Points; Gaurav Pal – stackArmor; Andrew Plato – Anitian
Tuesday, Oct 29
3:00 pm
Artificial Intelligence: War of the Machines
Location: Northern E2
Alex Holden, CISSP – Hold Security, LLC
Tuesday, Oct 29
4:15 pm
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security
Location: Northern E2
Lenin Aboagye – Kogni; Avinash Ramineni – Kogni
Security Mash-Up
Monday, Oct 28
9:45 am
5 Ways to Improve Your Cyber Risk Communications
Location: Asia 4
Chris Veltsos – MSUM
Monday, Oct 28
11:00 am
We Due C.A.R.E
Location: Asia 4
Soumendra Bhattacharya – Delta Dental of California; Chad Lomax – Delta Dental of California; Pankaj Moolrajani – Delta Dental of California; Lynette Qu – Delta Dental of California
Monday, Oct 28
3:15 pm
Information Security and Law
Location: Asia 4
John Bandler, Esq., CISSP – Bandler Law Firm PLLC and Bandler Group LLC
Monday, Oct 28
4:30 pm
The Contract CISO: Bringing Security in Line with Business
Location: Asia 4
Michael D. Weisberg – Garnet River, LLC
Tuesday, Oct 29
10:30 am
Energizing the Next Generation of Cybersecurity Professions through Mentorship
Location: Asia 4
Noureen Njoroge – CISCO; Steve Hunt, MA – Communities of Excellence; Reena Madan – Verizon; Rocio Baeza – CyberSecurityBase; Katrina Phiri – PwC; John R. Sisler, CISSP – AICPA
Tuesday, Oct 29
1:45 pm
CANCELLED: Preserving Trust Through Integrated Incident Response Planning
Location: Asia 4
Loren Mahler – Dealy Mahler Strategies, LLC
Tuesday, Oct 29
3:00 pm
Taming the Bots
Location: Asia 4
MIke G. Rogge – AKAMAI Technologies
Tuesday, Oct 29
4:15 pm
Power Up Your Voice: Speaking to Sell Yourself in Your Career, Business and Life
Location: Asia 4
Debbie Christofferson, CISSP, CISM – Cloud Security Alliance; Pamela Fusco – CBG; Keri Pearlson, MS, DBA – MIT Sloan School of Management; Lisa Vaughan, CISSP – Mississippi Department of Environmental Quality; Jessica Gulick, CISSP – Katzcy
Wednesday, Oct 30
8:30 am
Semantic Encryption: A New Form of Encryption to Assist in Complying with GDPR and CCPA
Location: Asia 4
Jegannathan Mehanlingam – CipherWorks; Harvey H. Nusz – Capgemini
Wednesday, Oct 30
9:45 am
Hack Back—Is It Time?
Location: Asia 4
Jim Jenkins, M.Sc., CISSP – Boeing Employees Credit Union (BECU); Gerhard Steinke, CISSP – Seattle Pacific University
Wednesday, Oct 30
11:00 am
Acquiring and Retaining Cybersecurity Talent: A Proven Model
Location: Asia 4
Deidre Diamond – CyberSN and Brainbabe
Wednesday, Oct 30
1:45 pm
Now What? How to Start and Operate Your (ISC)
2
Chapter
Location: Asia 4
James R. McQuiggan, CISSP – KnowBe4
Wednesday, Oct 30
3:00 pm
'You’ve Got to be Kidding!': WTF Moments in Information Security
Location: Asia 4
Michael D. Weisberg – Garnet River, LLC
Student Experience
Monday, Oct 28
1:30 pm
Cybersecurity 101
Location: Northern BC
Christopher Hickernell, CISSP, CCSP – MHI Shared Services Americas; James R. McQuiggan, CISSP – KnowBe4; Walter Speelman, CISSP – (ISC)2 Central Florida Chapter; Ean Meyer, CISSP – Marriott Vacations Worldwide; Derrick Thomas, CISSP – Amgen
Wednesday, Oct 30
8:30 am
I Need a Mentor. Now What?
Location: Asia 5
Glenn Leifheit – Microsoft Corp.
Wednesday, Oct 30
9:45 am
A Reference Model of Cybersecurity Infrastructure
Location: Asia 5
Chris Grundemann, CISSP – Myriad360
Wednesday, Oct 30
11:00 am
Managing Generational Diversity on Your Security Dream Team
Location: Asia 5
Chris Castaldo – Dataminr; Brandon Dunlap – Brightfly, Inc.; Susan Phillips; Paul Ihme, CISSP, GREM – Soteria; Paul O'Connor, CISSP, C|EH, CHFI – Verizon
Wednesday, Oct 30
1:45 pm
Forensic Analyses of Audio, Acoustic and Video Evidence
Location: Asia 5
Herbert Joe – Law Office of Herbert Joe
Wednesday, Oct 30
3:00 pm
UAVs/Drones are Disrupting the Nation, Consider Innovating Cybersecurity
Location: Asia 5
Tomiko K. Evans, MS – RTAN - Aerial Footprint, LLC
Threats
Monday, Oct 28
9:45 am
Securing the Supplier: Supply Chain Complexity Creates Security Vulnerability
Location: Southern 2
Jeffrey J. Sweet, CISSP – American Electric Power
Monday, Oct 28
11:00 am
Follow the Risk with Adaptive Cybersecurity Assessments
Location: Southern 2
Gideon T. Rasmussen – Virtual CSO, LLC
Monday, Oct 28
3:15 pm
Infiltrating an Organization: A Live Demo
Location: Southern 2
Aelon Porat – Cision
Monday, Oct 28
4:30 pm
From Ethical Hacking to Ethical Attacking
Location: Southern 2
Russell Moore, CISSP – Computex Technology Solutions
Tuesday, Oct 29
10:30 am
Threat Hunting for M&A Cyber Due Diligence
Location: Southern 2
Jacob Williams – Rendition Infosec
Tuesday, Oct 29
1:45 pm
Did You Set It and Forget It?
Location: Southern 2
Julie Bergh – J & S Consulting
Tuesday, Oct 29
3:00 pm
Five-Sigma Network Events (and How to Find Them)
Location: Southern 2
John O'Neil – Edgewise Networks
Tuesday, Oct 29
4:15 pm
Addressing the Benefits and Challenges of Implementing the MITRE ATT&CK Framework
Location: Southern 2
Douglas Wagner – IBM
Wednesday, Oct 30
8:30 am
Importance of Cyber Security Incident Response Exercise for operational readiness
Location: Southern 2
Nate Zahedi, MBA – Microsoft
Wednesday, Oct 30
9:45 am
The Art of Cyber Threat Hunting - Behind the Scenes of MDR
Location: Southern 2
Michael Sci – eSentire
Wednesday, Oct 30
11:00 am
Insider Threats: Detecting the (Nearly) Undetectable
Location: Southern 2
Nick Cavalancia – Techvangelism
Wednesday, Oct 30
1:45 pm
Cyber Threat Intelligence After Dark
Location: Southern 2
Xena Olsen, MBA, GSEC, GCIH, GCFE, GMON, GDAT, GPEN – Financial Services
Wednesday, Oct 30
3:00 pm
Sun Tzu and the Art of Understanding and Responding to Your Attacker
Location: Southern 2
David Melnick, MBA, CIPP, CISSP – Proofpoint Inc.
Tools
Monday, Oct 28
9:45 am
DIY Data Lake: Enabling Your Team to Find the Needle in a Very Large Haystack
Location: Northern E4
Dave Waters, CISSP – BMC Software
Monday, Oct 28
11:00 am
Are You Thinking About Cybersecurity The Wrong Way?
Location: Northern E4
Darin Haines – MCPc
Monday, Oct 28
3:15 pm
Real-World Cyberwar and Blockchain Lessons From a Nation State
Location: Northern E4
Joseph Carson, CISSP – Thycotic
Monday, Oct 28
4:30 pm
Using Attack Tree Analysis to Make Risk-based Security Decisions
Location: Northern E4
Terrance R. Ingoldsby – Amenaza Technologies Limited
Tuesday, Oct 29
10:30 am
Killing them Softly with My Song—Gathering Intelligence with Enterprise Honeypots
Location: Northern E4
Aamir Lakhani – Fortinet
Tuesday, Oct 29
1:45 pm
CANCELLED - macOS in the Enterprise: Threats, Risks and Management
Location: Northern E4
Mark A. Regensberg – Utility Warehouse
Tuesday, Oct 29
3:00 pm
A Low-Cost Security Monitoring Solution
Location: Northern E4
Tony Miedaner, CISSP, CISA, CEH – Geddes Federal; Aaron Case – Geddes Federal Savings & Loan
Tuesday, Oct 29
4:15 pm
Implementing Common Open Standards Across Cybersecurity Learning and Cyber Ranges
Location: Northern E4
Andrew Smallwood, CISSP, CCP, HCS, PMP – Booz Allen Hamilton
Workshop
Wednesday, Oct 30
9:45 am
Cloud Risk and Governance: Hands-on
Location: Asia 1
Jon-Michael C. Brook – Guide Holdings, LLC
Wednesday, Oct 30
9:45 am
The Art and Science of Cyber Response
Location: Asia 2
Lucie Hayward – Kroll; Michael Quinn – Kroll
Wednesday, Oct 30
1:45 pm
Introduction to PCI DSS Credit Card Security/Advance Topics in PCI Compliancy
Location: Oceanic 3
Dimitrios Hilton – LOGIS
Wednesday, Oct 30
1:45 pm
Let’s Make Risk a Game!
Location: Asia 2
Earl Crane, PhD – Emergynt; Joel Benge – ADG Creative
Wednesday, Oct 30
1:45 pm
Shoestring Security: Using a Raspberry Pi for Economic Security
Location: Asia 1
John Carnes – Anthem, Inc; Selvan Snow, CISSP, CCSP – Snow Group Technologies
Back to Top