Skip to main content

Full Schedule

Full Schedule

  • Monday, October 10, 2022
  • 8:00 AM – 9:30 AM US PDT
    Keynote Presentation - To be Announced
  • 9:30 AM – 10:00 AM US PDT
    Exhibit Hall Opening & Break
  • 10:00 AM – 10:50 AM US PDT
    Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft Skills
  • 10:00 AM – 10:55 AM US PDT
    Are Deepfakes Really a Security Threat?
  • 10:00 AM – 10:55 AM US PDT
    Digital Governance: A Fireside Chat with IAPP and (ISC)²
  • 10:00 AM – 10:55 AM US PDT
    Effective Cybersecurity Board Reporting
  • 10:00 AM – 10:55 AM US PDT
    Ethics Confidential: Inside the Inner-workings of the Ethics Committee
  • 10:00 AM – 10:55 AM US PDT
    Fortify Your Cloud Security - Sponsored by Sysdig
  • 10:00 AM – 10:55 AM US PDT
    How to Proof of Concept (PoC) Cybersecurity tools
  • 10:00 AM – 10:55 AM US PDT
    Incident Response Ready - Key Steps of a Ransomware Incident Response Plan
  • 10:00 AM – 10:55 AM US PDT
    OWASP Top 10 Risks
  • 10:00 AM – 10:55 AM US PDT
    Trust No One: Practical Zero-Trust for Cloud
  • 10:35 AM – 11:35 AM US PDT
    Is Your Cloud Data Lurking in the Shadows?
  • 11:05 AM – 12:00 PM US PDT
    13 Keys to Unlock Mentoring Cybersecurity Interns
  • 11:05 AM – 12:00 PM US PDT
    A handful of needles in a million attack haystack: attack tree analysis of an ICS
  • 11:05 AM – 12:00 PM US PDT
    Dead Man's Hand: Mobile Application Threat Modeling
  • 11:05 AM – 12:00 PM US PDT
    Impacting and actionable dashboards to monitor your security posture and engage with senior management
  • 11:05 AM – 12:00 PM US PDT
    Self-Protecting Data: An Artificial Intelligence Use Case
  • 11:05 AM – 12:00 PM US PDT
    So, you’re a new security leader, what now? … Build, Implement, and measure your success.
  • 11:05 AM – 12:00 PM US PDT
    The Fourth Industrial Revolutions Impact on Cybersecurity Programs
  • 11:05 AM – 12:00 PM US PDT
    The Intersection of Fraud Prevention and Cybersecurity
  • 11:05 AM – 12:00 PM US PDT
    Women's Career Path in Digital Trust Industry 2022
  • 12:00 PM – 12:50 PM US PDT
    Lunch
  • 12:50 PM – 2:20 PM US PDT
    Town Hall
  • 1:00 PM – 1:50 PM US PDT
    Career Center Series: 10 Things Every Job Seeker Should Know
  • 2:00 PM – 2:50 PM US PDT
    Career Center Series: Military Transition Success
  • 2:30 PM – 3:30 PM US PDT
    An Insider View of CISA's ICT Supply Chain Risk Management (SCRM) Task Force
  • 2:30 PM – 3:30 PM US PDT
    Creating a Behavioral Cybersecurity Program
  • 2:30 PM – 3:30 PM US PDT
    'Fail to Plan = Plan to Fail' - Preparing For Your Cybersecurity Incident Response
  • 2:30 PM – 3:30 PM US PDT
    No More Sodinokibi - A Hybrid Software Application for Detecting the REvil/Sodinokibi Ransomware
  • 2:30 PM – 3:30 PM US PDT
    Rejuvenating or Reforming Your Chapter
  • 2:30 PM – 3:30 PM US PDT
    Security metrics - how to measure it efficiently
  • 2:30 PM – 3:30 PM US PDT
    So you want to be an expert witness
  • 2:30 PM – 3:30 PM US PDT
    Top public cloud security fails and how to avoid them
  • 2:30 PM – 3:30 PM US PDT
    Zero Trust Is The Only Security Strategy
  • 3:00 PM – 3:50 PM US PDT
    Career Center Series: Virtual Job Fair Success
  • 3:30 PM – 4:00 PM US PDT
    Exhibit Hall Break
  • 3:50 PM – 4:10 PM US PDT
    Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
  • 4:00 PM – 5:00 PM US PDT
    Against All Odds: Cloud SaaS Attack Surface Management
  • 4:00 PM – 5:00 PM US PDT
    All About That Data: How Data Security and Management Will Rule The World
  • 4:00 PM – 5:00 PM US PDT
    Best Practices for Managing & Preventing Insider Threats from Interviewing Experts
  • 4:00 PM – 5:00 PM US PDT
    Cyber Risk Metrics & Reporting
  • 4:00 PM – 5:00 PM US PDT
    How to Create Effective and Engaging Cybersecurity Training for Employees
  • 4:00 PM – 5:00 PM US PDT
    Introduction to Threat Hunting
  • 4:00 PM – 5:00 PM US PDT
    Plugging the gaps in cybersecurity with a Shift Left strategy
  • 4:00 PM – 5:00 PM US PDT
    Three Simple and Effective Cybersecurity Exercises
  • 4:00 PM – 5:00 PM US PDT
    Vulnerability Management is Dead! Long Live Vulnerability Management!
  • 6:00 PM – 8:30 PM US PDT
    Networking Extravaganza