Skip to main content

Full Schedule

Full Schedule

  • Monday, October 18, 2021
  • 9:00 AM – 9:30 AM Eastern
    Kickoff and Welcome
  • 9:30 AM – 10:30 AM Eastern
    Keynote - Defend Today, Secure Tomorrow
  • 11:00 AM – 12:00 PM Eastern
    Does Cyber Security have an Image Problem?
  • 11:00 AM – 12:00 PM Eastern
    How to make Black Swans extinct and why ISO31000 is the weapon of choice
  • 11:00 AM – 12:00 PM Eastern
    How to Prepare and Secure Critical Infrastructure for the Future of Digitalisation
  • 11:00 AM – 12:00 PM Eastern
    Human Security Engineering: A Strategy to Address "The User Problem"
  • 11:00 AM – 12:00 PM Eastern
    Introducing Law, Regulation and its Increasing Intersections with Information Security
  • 11:00 AM – 12:00 PM Eastern
    Just How Far Can We Trust ‘Zero Trust’
  • 11:00 AM – 12:00 PM Eastern
    Lessons learned from enterprise cloud security programs
  • 11:00 AM – 12:00 PM Eastern
    Measuring Security Effectiveness
  • 11:00 AM – 12:00 PM Eastern
    Red Teaming with Dark Web and GitHub PoC Exploits
  • 11:00 AM – 12:00 PM Eastern
    Teamwork: Law Enforcement, the FBI, and You
  • 11:00 AM – 12:00 PM Eastern
    The Map and the Territory: MITRE ATT&CK In Theory and Practice
  • 1:00 PM – 2:30 PM Eastern
    Town Hall
  • 2:45 PM – 3:45 PM Eastern
    Achieving HITRUST on a Budget.
  • 2:45 PM – 3:45 PM Eastern
    Container Security for clusters running at Scale (T-Mobile)
  • 2:45 PM – 3:45 PM Eastern
    Creating a virtual first line of defence for secure software development
  • 2:45 PM – 3:45 PM Eastern
    Excelling in a cybersecurity career path
  • 2:45 PM – 3:45 PM Eastern
    No Trust Without Verification - The Journey to Zero Trust in a Hybrid Environment
  • 2:45 PM – 3:45 PM Eastern
    Pandemic, Proximity, and Privacy
  • 2:45 PM – 3:45 PM Eastern
    Ransom-wave Aware
  • 2:45 PM – 3:45 PM Eastern
    SSCIM: An OSI-like model for Supply Chain Cyber Security
  • 2:45 PM – 3:45 PM Eastern
    Stay ahead of the game: automate your threat hunting workflows
  • 2:45 PM – 3:45 PM Eastern
    What are you leaking? Practical steps in knowing your OPSEC.
  • 4:15 PM – 5:15 PM Eastern
    Cloud Top Threats Case Studies and (im)proving your security?
  • 4:15 PM – 5:15 PM Eastern
    Cyber Guardian Exercise: A Case Study in Brazil to Address Challenges in Cybersecurity
  • 4:15 PM – 5:15 PM Eastern
    Developer First - A new way to look at Application Security
  • 4:15 PM – 5:15 PM Eastern
    GDPR Security Post-Mortems: 10 MORE Critical Lessons You Can Apply Now
  • 4:15 PM – 5:15 PM Eastern
    How Franchisees & Midsized Businesses Elevate their Cybersecurity to Protect their Data, Organization, and Brand
  • 4:15 PM – 5:15 PM Eastern
    How to Effectively Communicate to the Board about Third Party Risk
  • 4:15 PM – 5:15 PM Eastern
    InfoSec Lessons From a Saguaro Cactus
  • 4:15 PM – 5:15 PM Eastern
    Secure My Privacy
  • 4:15 PM – 5:15 PM Eastern
    Security Automation: Research Findings, Best Practices, and Lessons Learned
  • Tuesday, October 19, 2021
  • 8:00 AM – 9:00 AM Eastern
    Keynote - Into the Unknown: How Leadership, Ingenuity, and Perseverance Put a Rover on Mars
  • 9:00 AM – 10:00 AM Eastern
    Keynote - Daymond John's 5 Shark Points for Success *
  • 10:30 AM – 11:30 AM Eastern
    "But we've never done it that way!" Disruptive Security Change in Times of Covid
  • 10:30 AM – 11:30 AM Eastern
    Achieving Automation of the 'Sec' Processes within a Highly Performant DevSecOps Pipeline
  • 10:30 AM – 11:30 AM Eastern
    Actionable threat intelligence using the DIY approach
  • 10:30 AM – 11:30 AM Eastern
    Augmenting ZTA to Endpoints using Blockchain
  • 10:30 AM – 11:30 AM Eastern
    Digital First - a progressive approach to Information Security
  • 10:30 AM – 11:30 AM Eastern
    How Cyber Pros Can Inspire a Safe Community
  • 10:30 AM – 11:30 AM Eastern
    NIST Zero Trust - understanding and navigating NIST Zero Trust under the current threat landscape
  • 10:30 AM – 11:30 AM Eastern
    Pivotal Security: Successfully Applying Agile Practices to a Security Program
  • 10:30 AM – 11:30 AM Eastern
    Should You Trust That Email? Technologies and Strategies That Can Help!
  • 10:30 AM – 11:30 AM Eastern
    What to read after you've gotten your certification (or you need a break from studying)
  • 10:30 AM – 11:30 AM Eastern
    Women in Cybersecurity - a discussion of the journey, the challenges, and the opportunities
  • 11:45 AM – 12:45 PM Eastern
    Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
  • 11:45 AM – 12:45 PM Eastern
    CyberLeaders 3.0: Case Study on Leadership Development to Retain Cyber Talent
  • 11:45 AM – 12:45 PM Eastern
    Data Science in Cybersecurity: How We Tackle Ambiguous and Undefined Problems
  • 11:45 AM – 12:45 PM Eastern
    Does size matter in security?
  • 11:45 AM – 12:45 PM Eastern
    Getting Burned by Solar Winds - How to Hunt for it in a Microsoft Network
  • 11:45 AM – 12:45 PM Eastern
    Introduction to the Factor Analysis of Information Risk (FAIR) risk quantification standard
  • 11:45 AM – 12:45 PM Eastern
    Lies, Damned Lies and Statistics, Cyber Security in the Misinformation Age
  • 11:45 AM – 12:45 PM Eastern
    Pandemic: Changes in Social Engineering Defence, and in Attacker's Tactics, Techniques, and Procedures
  • 11:45 AM – 12:45 PM Eastern
    Pen-Testing Your Cloud Infrastructure Environment
  • 11:45 AM – 12:45 PM Eastern
    The Evolution of Information Security Management
  • 11:45 AM – 12:45 PM Eastern
    The PCI Dream Team: Solving the biggest PCI DSS nightmares
  • 11:45 AM – 12:45 PM Eastern
    Third-Party Risk Management & Supply Chain Security
  • 12:45 PM – 1:45 PM Eastern
    Lunch with Apollo Robbins
  • 1:45 PM – 2:45 PM Eastern
    Creativity and Innovation in Infosec
  • 1:45 PM – 2:45 PM Eastern
    Driving Change and Managing an Effective Awareness and Training Program through a Global Pandemic
  • 1:45 PM – 2:45 PM Eastern
    First Look: 2021 Cybersecurity Workforce Study
  • 1:45 PM – 2:45 PM Eastern
    Getting offensive with your third parties
  • 1:45 PM – 2:45 PM Eastern
    Lessons Learned Building an Information Security Program from Scratch
  • 1:45 PM – 2:45 PM Eastern
    Ransomware
  • 1:45 PM – 2:45 PM Eastern
    Software Supply Chain - lessons learned
  • 1:45 PM – 2:45 PM Eastern
    The Temporary Crown : A talk with two vCISO's
  • 1:45 PM – 2:45 PM Eastern
    We Fail at the Basics...and then We Get Hacked
  • 1:45 PM – 2:45 PM Eastern
    What Cybersecurity Can Learn from Honeybees
  • 1:45 PM – 2:45 PM Eastern
    Yes, the FBI Really Can Remove Malware Without Your Permission
  • 3:00 PM – 4:00 PM Eastern
    Breathe In, Breathe Out – Finding Balance to Keep Burnout at Bay
  • 3:00 PM – 4:00 PM Eastern
    Cyber Incident Response and Litigation: Today's Incident Response Determines Tomorrow's Legal Outcomes
  • 3:00 PM – 4:00 PM Eastern
    Cyber-resiliency vs. Cybersecurity. What's the difference and Why Care?
  • 3:00 PM – 4:00 PM Eastern
    Developers Dislike Security: Ten Frustrations and Resolutions
  • 3:00 PM – 4:00 PM Eastern
    Do Secure API or Do Not: Defend the Supply Chain with Secure APIs and Identity
  • 3:00 PM – 4:00 PM Eastern
    Embrace the Shadow: The beauty in unsanctioned IT
  • 3:00 PM – 4:00 PM Eastern
    Engineering Zero Trust Cloud Architectures
  • 3:00 PM – 4:00 PM Eastern
    Fundamentals of Deepfakes: How are they made and how do I spot them?
  • 3:00 PM – 4:00 PM Eastern
    Implementing ISO 27701 with ISO 27001 - a potent combination to tackle Privacy and InfoSec
  • 3:00 PM – 4:00 PM Eastern
    OSINT Methods and Techniques for Blockchain Investigators and IT Auditors
  • 3:00 PM – 4:00 PM Eastern
    Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
  • 3:00 PM – 4:00 PM Eastern
    What should your DevSecOps program look like?
  • 4:30 PM – 5:30 PM Eastern
    Breaking Dark Web Barriers
  • 4:30 PM – 5:30 PM Eastern
    Cyber-Peloton - Breaking Away from the Pack
  • 4:30 PM – 5:30 PM Eastern
    Dangerous Risks Arise From Cross Regulatory Compliance Requirements, Differing Privacy Laws, & New Cyber Cases
  • 4:30 PM – 5:30 PM Eastern
    Decoding Cyber - Supply Chain Risk Management through NIST
  • 4:30 PM – 5:30 PM Eastern
    Higher (Hire) Expectations
  • 4:30 PM – 5:30 PM Eastern
    Modern Android Security
  • 4:30 PM – 5:30 PM Eastern
    Securing the Supply Chain Security When the Insider Threat is the Weakest Link
  • 4:30 PM – 5:30 PM Eastern
    Threat Intelligence and IoT Patent Considerations
  • 4:30 PM – 5:30 PM Eastern
    Trends and Trajectories in Control System Cyber Security: Findings of the (CS)2AI-KPMG 2021 CSCS Report
  • 4:30 PM – 5:30 PM Eastern
    Why I Quit Security For A While And Came Back (But Might Leave Again)
  • 4:30 PM – 5:30 PM Eastern
    Zero Trust : From Castle to Cloud
  • Wednesday, October 20, 2021
  • 9:00 AM – 10:00 AM Eastern
    Keynote - The Rise of the New Inside Threat
  • 10:30 AM – 11:30 AM Eastern
    10 MORE Things Attorneys Can Do For Your InfoSec Team
  • 10:30 AM – 11:30 AM Eastern
    2021 DBIR and the VERIS A4 Threat Model
  • 10:30 AM – 11:30 AM Eastern
    AWS, Azure and GCP security
  • 10:30 AM – 11:30 AM Eastern
    Diversity is a result of inclusive cultures
  • 10:30 AM – 11:30 AM Eastern
    How We Can Learn to Stop Worrying and Love Machine Learning
  • 10:30 AM – 11:30 AM Eastern
    Incident Response: How To Keep Your Company Name Out Of The Evening News
  • 10:30 AM – 11:30 AM Eastern
    Not another boring Cyber Insurance discussion
  • 10:30 AM – 11:30 AM Eastern
    Outsourcing IT, would you like security with that?
  • 10:30 AM – 11:30 AM Eastern
    Securing Critical Infrastructure Through Cyber-Focused Procurement Language
  • 10:30 AM – 11:30 AM Eastern
    Self-Protecting Data - an Artificial Intelligence & Zero Trust Use Case
  • 10:30 AM – 11:30 AM Eastern
    Why you should be introducing DevSecOps to your Organization
  • 11:45 AM – 12:45 PM Eastern
    Inspecting TLS
  • 11:45 AM – 1:00 PM Eastern
    Confessions of a CIA Spy - The Art of Human Hacking
  • 11:45 AM – 1:00 PM Eastern
    Cracking the Cyber Liability Code
  • 11:45 AM – 1:00 PM Eastern
    Evolution of the EU "Cookie Law"
  • 11:45 AM – 1:00 PM Eastern
    Evolving Threat Modeling for Agility and Business Value
  • 11:45 AM – 1:00 PM Eastern
    Exploring Security Controls needed to protect Medical Wearable Devices
  • 11:45 AM – 1:00 PM Eastern
    FROM ZERO TO FULL DOMAIN ADMIN - Tracking the digital footprint of a ransomware attack
  • 11:45 AM – 1:00 PM Eastern
    Help Organizations Protect against Doxing Attacks
  • 11:45 AM – 1:00 PM Eastern
    How to measure your DevSecOps effectively
  • 11:45 AM – 1:00 PM Eastern
    Securing the Architecture of the Industrial Internet of Things: from the Edge to the Cloud
  • 11:45 AM – 1:00 PM Eastern
    Translating Compliance - The importance of Effectively Bridging Technology and Audit Speak