Skip to main content

Full Schedule

Full Schedule

  • Monday, October 10, 2022
  • 8:00 AM – 9:30 AM US PDT
    Keynote Presentation - To be Announced
  • 9:30 AM – 10:00 AM US PDT
    Exhibit Hall Opening & Break
  • 10:00 AM – 10:50 AM US PDT
    Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft Skills
  • 10:00 AM – 10:55 AM US PDT
    Are Deepfakes Really a Security Threat?
  • 10:00 AM – 10:55 AM US PDT
    Digital Governance: A Fireside Chat with IAPP and (ISC)²
  • 10:00 AM – 10:55 AM US PDT
    Effective Cybersecurity Board Reporting
  • 10:00 AM – 10:55 AM US PDT
    Ethics Confidential: Inside the Inner-workings of the Ethics Committee
  • 10:00 AM – 10:55 AM US PDT
    Fortify Your Cloud Security - Sponsored by Sysdig
  • 10:00 AM – 10:55 AM US PDT
    How to Proof of Concept (PoC) Cybersecurity tools
  • 10:00 AM – 10:55 AM US PDT
    Incident Response Ready - Key Steps of a Ransomware Incident Response Plan
  • 10:00 AM – 10:55 AM US PDT
    OWASP Top 10 Risks
  • 10:00 AM – 10:55 AM US PDT
    Trust No One: Practical Zero-Trust for Cloud
  • 10:35 AM – 11:35 AM US PDT
    Is Your Cloud Data Lurking in the Shadows?
  • 11:05 AM – 12:00 PM US PDT
    13 Keys to Unlock Mentoring Cybersecurity Interns
  • 11:05 AM – 12:00 PM US PDT
    A handful of needles in a million attack haystack: attack tree analysis of an ICS
  • 11:05 AM – 12:00 PM US PDT
    Dead Man's Hand: Mobile Application Threat Modeling
  • 11:05 AM – 12:00 PM US PDT
    Impacting and actionable dashboards to monitor your security posture and engage with senior management
  • 11:05 AM – 12:00 PM US PDT
    Self-Protecting Data: An Artificial Intelligence Use Case
  • 11:05 AM – 12:00 PM US PDT
    So, you’re a new security leader, what now? … Build, Implement, and measure your success.
  • 11:05 AM – 12:00 PM US PDT
    The Fourth Industrial Revolutions Impact on Cybersecurity Programs
  • 11:05 AM – 12:00 PM US PDT
    The Intersection of Fraud Prevention and Cybersecurity
  • 11:05 AM – 12:00 PM US PDT
    Women's Career Path in Digital Trust Industry 2022
  • 12:00 PM – 12:50 PM US PDT
    Lunch
  • 12:50 PM – 2:20 PM US PDT
    Town Hall
  • 1:00 PM – 1:50 PM US PDT
    Career Center Series: 10 Things Every Job Seeker Should Know
  • 2:00 PM – 2:50 PM US PDT
    Career Center Series: Military Transition Success
  • 2:30 PM – 3:30 PM US PDT
    An Insider View of CISA's ICT Supply Chain Risk Management (SCRM) Task Force
  • 2:30 PM – 3:30 PM US PDT
    Creating a Behavioral Cybersecurity Program
  • 2:30 PM – 3:30 PM US PDT
    'Fail to Plan = Plan to Fail' - Preparing For Your Cybersecurity Incident Response
  • 2:30 PM – 3:30 PM US PDT
    No More Sodinokibi - A Hybrid Software Application for Detecting the REvil/Sodinokibi Ransomware
  • 2:30 PM – 3:30 PM US PDT
    Rejuvenating or Reforming Your Chapter
  • 2:30 PM – 3:30 PM US PDT
    Security metrics - how to measure it efficiently
  • 2:30 PM – 3:30 PM US PDT
    So you want to be an expert witness
  • 2:30 PM – 3:30 PM US PDT
    Top public cloud security fails and how to avoid them
  • 2:30 PM – 3:30 PM US PDT
    Zero Trust Is The Only Security Strategy
  • 3:00 PM – 3:50 PM US PDT
    Career Center Series: Virtual Job Fair Success
  • 3:30 PM – 4:00 PM US PDT
    Exhibit Hall Break
  • 3:50 PM – 4:10 PM US PDT
    Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
  • 4:00 PM – 5:00 PM US PDT
    Against All Odds: Cloud SaaS Attack Surface Management
  • 4:00 PM – 5:00 PM US PDT
    All About That Data: How Data Security and Management Will Rule The World
  • 4:00 PM – 5:00 PM US PDT
    Best Practices for Managing & Preventing Insider Threats from Interviewing Experts
  • 4:00 PM – 5:00 PM US PDT
    Cyber Risk Metrics & Reporting
  • 4:00 PM – 5:00 PM US PDT
    How to Create Effective and Engaging Cybersecurity Training for Employees
  • 4:00 PM – 5:00 PM US PDT
    Introduction to Threat Hunting
  • 4:00 PM – 5:00 PM US PDT
    Plugging the gaps in cybersecurity with a Shift Left strategy
  • 4:00 PM – 5:00 PM US PDT
    Three Simple and Effective Cybersecurity Exercises
  • 4:00 PM – 5:00 PM US PDT
    Vulnerability Management is Dead! Long Live Vulnerability Management!
  • 6:00 PM – 8:30 PM US PDT
    Networking Extravaganza
  • Tuesday, October 11, 2022
  • 7:00 AM – 8:00 AM US PDT
    Breakfast
  • 8:00 AM – 9:00 AM US PDT
    Keynote Presentation - Cybersecurity Insights
  • 9:05 AM – 10:05 AM US PDT
    Keynote Presentation - Inside “The Infiltrator”: How Ethics and Teamwork Shaped the Life (and Near Death) of an Undercover Operator in the Colombian Cartel Underworld
  • 10:00 AM – 10:50 AM US PDT
    Career Center Series: Conference Presenting: The Art of Leadership and Soft Skills Development Through Presentation
  • 10:05 AM – 10:35 AM US PDT
    Exhibit Hall & Break
  • 10:35 AM – 11:35 AM US PDT
    A Fireside Chat with CISA and ISC2
  • 10:35 AM – 11:35 AM US PDT
    Cybersecurity & Third-Party Risk: Third Party Threat Hunting
  • 10:35 AM – 11:35 AM US PDT
    Everything I know about Compliance I learned from Patrick Swayze in Road House
  • 10:35 AM – 11:35 AM US PDT
    How to diversity your cybersecurity teams
  • 10:35 AM – 11:35 AM US PDT
    How to Establish a (successful) Security Strategy from Scratch
  • 10:35 AM – 11:35 AM US PDT
    Let's handle that GDPR data breach!
  • 10:35 AM – 11:35 AM US PDT
    Perspectives on Cybersecurity: A Fireside Chat with (ISC)2 and CISA
  • 10:35 AM – 11:35 AM US PDT
    Privacy-Preserving Analytics and Secure Multiparty Computation
  • 10:35 AM – 11:35 AM US PDT
    Software Bills of Materials (SBOMs) and other things that can go wrong...
  • 10:35 AM – 11:35 AM US PDT
    What to expect when you are expecting…. your CISO to leave.
  • 11:45 AM – 12:45 PM US PDT
    A Deep Dive into the Legalities of the NSO Group and Pegasus Software
  • 11:45 AM – 12:45 PM US PDT
    Considering culture in your cyber strategy
  • 11:45 AM – 12:45 PM US PDT
    Enterprise Security Risk Assessment (ESRA)
  • 11:45 AM – 12:45 PM US PDT
    Get real about Cloud Incident Response
  • 11:45 AM – 12:45 PM US PDT
    Hacking Gamification – Going from Zero to Privileged PWNED
  • 11:45 AM – 12:45 PM US PDT
    Improving Cybersecurity Posture in Critical Infrastructure
  • 11:45 AM – 12:45 PM US PDT
    Modeling Security Architectures with ArchiMate 3.1
  • 11:45 AM – 12:45 PM US PDT
    Next Gen IAM and PAM with SOAR and AI
  • 11:45 AM – 12:45 PM US PDT
    Ready for the next frontier in IAM strategy? - sponsored by Keyfactor
  • 11:45 AM – 12:45 PM US PDT
    Security Automation: That which can be done for you...
  • 12:00 PM – 12:50 PM US PDT
    Career Center Series: Top Tips for Using Social Media in Your Job Search
  • 12:45 PM – 1:35 PM US PDT
    Lunch
  • 1:00 PM – 1:50 PM US PDT
    Career Center Series: How to Succeed at Technical Interviews
  • 1:35 PM – 2:35 PM US PDT
    A Metaverse of Insecurity
  • 1:35 PM – 2:35 PM US PDT
    Avoid Being the Middle Child - Ensuring Sec gets the Attention and Resources in DevSecOps
  • 1:35 PM – 2:35 PM US PDT
    Cybersecurity Legal Considerations for the Russia/Ukraine War
  • 1:35 PM – 2:35 PM US PDT
    Healthcare Hacked! Culture, Costs, and Cures
  • 1:35 PM – 2:35 PM US PDT
    Hiring a team: Where is the Draft class?
  • 1:35 PM – 2:35 PM US PDT
    Personal Resilience, Risk Based Approach to a Cyber Career with no Cyber Qualifications or Experience
  • 1:35 PM – 2:35 PM US PDT
    What it takes to build and maintain secure digital products?
  • 1:35 PM – 2:35 PM US PDT
    Why Your Employees Hate Information Security
  • 1:35 PM – 2:35 PM US PDT
    Zero Trust Networking: Betting on mTLS to Secure Cloud Native Services
  • 2:00 PM – 2:50 PM US PDT
    Career Center Series: Turbocharge Your Military Resumes by Converting to Civilian Speak
  • 2:45 PM – 3:45 PM US PDT
    Achieving Data Security and Analytics with AI
  • 2:45 PM – 3:45 PM US PDT
    Can you "Shift Left" Compliance? - sponsored by RegScale
  • 2:45 PM – 3:45 PM US PDT
    Detect Better and Respond Faster to Cyber Attacks
  • 2:45 PM – 3:45 PM US PDT
    Mentalism, Magic & CyberSecurity
  • 2:45 PM – 3:45 PM US PDT
    Today's Incident is Tomorrow's Litigation
  • 2:45 PM – 3:45 PM US PDT
    Using Augmented Reality to Conduct Virtual Inventories of Real Assets
  • 2:45 PM – 3:45 PM US PDT
    Why Your Personal Infosec Brand Matters
  • 3:45 PM – 4:15 PM US PDT
    Exhibit Hall & Break
  • 3:50 PM – 4:10 PM US PDT
    Solutions Theater Presentation - Securing DevOps in the Cloud with Privileged Access Management (PAM) (NO CPE)
  • 4:00 PM – 4:50 PM US PDT
    Career Center Series: Envisioning Your Executive Career Path
  • 4:15 PM – 5:15 PM US PDT
    Avoiding Cybersecurity Achilles' Heels with Application Programming Interfaces (APIs)
  • 4:15 PM – 5:15 PM US PDT
    Breaking Barriers -- Climbing the Ladder and Breaking the Glass Ceiling for Women in Cybersecurity
  • 4:15 PM – 5:15 PM US PDT
    Career Benefits in Cybersecurity Apprenticeships
  • 4:15 PM – 5:15 PM US PDT
    Cloud Risk Management - Cloud Customer's Perspective
  • 4:15 PM – 5:15 PM US PDT
    Cybersecurity and risk in OT as convergence accelerates in a changing world
  • 4:15 PM – 5:15 PM US PDT
    Key Success Factors When Outsourcing Incident Response
  • 4:15 PM – 5:15 PM US PDT
    Security Standards/ ISO2700: A tick-box exercise or an enabler to growth?
  • 4:15 PM – 5:15 PM US PDT
    The Security Journey: How to build a Business-aligned Risk Management Program
  • 4:15 PM – 5:15 PM US PDT
    Why We Fail at Data Security (and How to do Better)
  • 5:15 PM – 7:00 PM US PDT
    Networking Event
  • Wednesday, October 12, 2022
  • 8:00 AM – 9:00 AM US PDT
    Keynote: Why Political Risk and Cybersecurity Collide in Times of Crisis
  • 9:05 AM – 10:05 AM US PDT
    Keynote Presentation - To be Announced
  • 10:15 AM – 11:15 AM US PDT
    Are You Ready for Scaled Quantum Computing? Anticipating Cryptographic Readiness Challenges for a Quantum Age
  • 10:15 AM – 11:15 AM US PDT
    Cloud Risk and Governance - CCM v4 Hands-on
  • 10:15 AM – 11:15 AM US PDT
    Creating Lasting Security Change
  • 10:15 AM – 11:15 AM US PDT
    Payment Plans: A Checklist of Critical Considerations before Paying Ransomware Demands
  • 10:15 AM – 11:15 AM US PDT
    Taking a threat-centric approach to building cyber resiliency
  • 10:15 AM – 11:15 AM US PDT
    The Day After: Managing Post-Incident Hardening & Resiliency
  • 10:15 AM – 11:15 AM US PDT
    The Next Big Attack: What to expect and how to protect
  • 10:15 AM – 11:15 AM US PDT
    The Tao of Vulnerability Management
  • 10:15 AM – 11:15 AM US PDT
    Using the Marine Corps 70% rule to hire Cybersecurity talent quickly and efferently
  • 11:25 AM – 12:25 PM US PDT
    Build Information Resilience into your Supply Chain and Save a Ton of Money
  • 11:25 AM – 12:25 PM US PDT
    CyberTheft of Trade Secrets, and Attorneys’ Ethical Considerations during Data Breaches
  • 11:25 AM – 12:25 PM US PDT
    Elite Security Champions Build Strong Security Culture
  • 11:25 AM – 12:25 PM US PDT
    Emerging threats against cloud application identities and what you should do about it
  • 11:25 AM – 12:25 PM US PDT
    My Baby Done Bad Crypto, My Sweet Baby Done Me Wrong
  • 11:25 AM – 12:25 PM US PDT
    Neurodiversity Recruitment and Retention in Entry and Midcareer Cybersecurity
  • 11:25 AM – 12:25 PM US PDT
    Search Warrants, Subpoenas, and Court Orders: What You Need to Know
  • 11:25 AM – 12:25 PM US PDT
    Securing Industrial Control System Criticality of ICS, Threats , Vulnerabilities, Mitigation of Risk
  • 11:25 AM – 12:25 PM US PDT
    Security Architecture - The Benefits & Framework