Skip to main content

Full Schedule

Full Schedule

  • Tuesday, October 11, 2022
  • 7:00 AM – 8:00 AM US PDT
    Breakfast
  • 8:00 AM – 9:00 AM US PDT
    Keynote Presentation - Cybersecurity Insights
  • 9:05 AM – 10:05 AM US PDT
    Keynote Presentation - Inside “The Infiltrator”: How Ethics and Teamwork Shaped the Life (and Near Death) of an Undercover Operator in the Colombian Cartel Underworld
  • 10:00 AM – 10:50 AM US PDT
    Career Center Series: Conference Presenting: The Art of Leadership and Soft Skills Development Through Presentation
  • 10:05 AM – 10:35 AM US PDT
    Exhibit Hall & Break
  • 10:35 AM – 11:35 AM US PDT
    A Fireside Chat with CISA and ISC2
  • 10:35 AM – 11:35 AM US PDT
    Cybersecurity & Third-Party Risk: Third Party Threat Hunting
  • 10:35 AM – 11:35 AM US PDT
    Everything I know about Compliance I learned from Patrick Swayze in Road House
  • 10:35 AM – 11:35 AM US PDT
    How to diversity your cybersecurity teams
  • 10:35 AM – 11:35 AM US PDT
    How to Establish a (successful) Security Strategy from Scratch
  • 10:35 AM – 11:35 AM US PDT
    Let's handle that GDPR data breach!
  • 10:35 AM – 11:35 AM US PDT
    Perspectives on Cybersecurity: A Fireside Chat with (ISC)2 and CISA
  • 10:35 AM – 11:35 AM US PDT
    Privacy-Preserving Analytics and Secure Multiparty Computation
  • 10:35 AM – 11:35 AM US PDT
    Software Bills of Materials (SBOMs) and other things that can go wrong...
  • 10:35 AM – 11:35 AM US PDT
    What to expect when you are expecting…. your CISO to leave.
  • 11:45 AM – 12:45 PM US PDT
    A Deep Dive into the Legalities of the NSO Group and Pegasus Software
  • 11:45 AM – 12:45 PM US PDT
    Considering culture in your cyber strategy
  • 11:45 AM – 12:45 PM US PDT
    Enterprise Security Risk Assessment (ESRA)
  • 11:45 AM – 12:45 PM US PDT
    Get real about Cloud Incident Response
  • 11:45 AM – 12:45 PM US PDT
    Hacking Gamification – Going from Zero to Privileged PWNED
  • 11:45 AM – 12:45 PM US PDT
    Improving Cybersecurity Posture in Critical Infrastructure
  • 11:45 AM – 12:45 PM US PDT
    Modeling Security Architectures with ArchiMate 3.1
  • 11:45 AM – 12:45 PM US PDT
    Next Gen IAM and PAM with SOAR and AI
  • 11:45 AM – 12:45 PM US PDT
    Ready for the next frontier in IAM strategy? - sponsored by Keyfactor
  • 11:45 AM – 12:45 PM US PDT
    Security Automation: That which can be done for you...
  • 12:00 PM – 12:50 PM US PDT
    Career Center Series: Top Tips for Using Social Media in Your Job Search
  • 12:45 PM – 1:35 PM US PDT
    Lunch
  • 1:00 PM – 1:50 PM US PDT
    Career Center Series: How to Succeed at Technical Interviews
  • 1:35 PM – 2:35 PM US PDT
    A Metaverse of Insecurity
  • 1:35 PM – 2:35 PM US PDT
    Avoid Being the Middle Child - Ensuring Sec gets the Attention and Resources in DevSecOps
  • 1:35 PM – 2:35 PM US PDT
    Cybersecurity Legal Considerations for the Russia/Ukraine War
  • 1:35 PM – 2:35 PM US PDT
    Healthcare Hacked! Culture, Costs, and Cures
  • 1:35 PM – 2:35 PM US PDT
    Hiring a team: Where is the Draft class?
  • 1:35 PM – 2:35 PM US PDT
    Personal Resilience, Risk Based Approach to a Cyber Career with no Cyber Qualifications or Experience
  • 1:35 PM – 2:35 PM US PDT
    What it takes to build and maintain secure digital products?
  • 1:35 PM – 2:35 PM US PDT
    Why Your Employees Hate Information Security
  • 1:35 PM – 2:35 PM US PDT
    Zero Trust Networking: Betting on mTLS to Secure Cloud Native Services
  • 2:00 PM – 2:50 PM US PDT
    Career Center Series: Turbocharge Your Military Resumes by Converting to Civilian Speak
  • 2:45 PM – 3:45 PM US PDT
    Achieving Data Security and Analytics with AI
  • 2:45 PM – 3:45 PM US PDT
    Can you "Shift Left" Compliance? - sponsored by RegScale
  • 2:45 PM – 3:45 PM US PDT
    Detect Better and Respond Faster to Cyber Attacks
  • 2:45 PM – 3:45 PM US PDT
    Mentalism, Magic & CyberSecurity
  • 2:45 PM – 3:45 PM US PDT
    Today's Incident is Tomorrow's Litigation
  • 2:45 PM – 3:45 PM US PDT
    Using Augmented Reality to Conduct Virtual Inventories of Real Assets
  • 2:45 PM – 3:45 PM US PDT
    Why Your Personal Infosec Brand Matters
  • 3:45 PM – 4:15 PM US PDT
    Exhibit Hall & Break
  • 3:50 PM – 4:10 PM US PDT
    Solutions Theater Presentation - Securing DevOps in the Cloud with Privileged Access Management (PAM) (NO CPE)
  • 4:00 PM – 4:50 PM US PDT
    Career Center Series: Envisioning Your Executive Career Path
  • 4:15 PM – 5:15 PM US PDT
    Avoiding Cybersecurity Achilles' Heels with Application Programming Interfaces (APIs)
  • 4:15 PM – 5:15 PM US PDT
    Breaking Barriers -- Climbing the Ladder and Breaking the Glass Ceiling for Women in Cybersecurity
  • 4:15 PM – 5:15 PM US PDT
    Career Benefits in Cybersecurity Apprenticeships
  • 4:15 PM – 5:15 PM US PDT
    Cloud Risk Management - Cloud Customer's Perspective
  • 4:15 PM – 5:15 PM US PDT
    Cybersecurity and risk in OT as convergence accelerates in a changing world
  • 4:15 PM – 5:15 PM US PDT
    Key Success Factors When Outsourcing Incident Response
  • 4:15 PM – 5:15 PM US PDT
    Security Standards/ ISO2700: A tick-box exercise or an enabler to growth?
  • 4:15 PM – 5:15 PM US PDT
    The Security Journey: How to build a Business-aligned Risk Management Program
  • 4:15 PM – 5:15 PM US PDT
    Why We Fail at Data Security (and How to do Better)
  • 5:15 PM – 7:00 PM US PDT
    Networking Event