Speakers
- Aaron Wampach
- Security Awareness... Much Ado About Nothing (05/17/16 — 1:30 PM)
- This Fog is really DeNSE (05/17/16 — 3:00 PM)
- Adam Brand
- Medical Devices: Pwnage and Honeypots (05/18/16 — 3:00 PM)
- Adam Harpool
- Minimizing Fraud Exposure Through ERP SODs (05/18/16 — 1:30 PM)
- Andrew Plato
- Insider Threat: Building a Multi-Generational Security Program (05/17/16 — 11:00 AM)
- Security Vision: Inspiring People to Embrace Security (05/17/16 — 1:30 PM)
- Barry Caplin
- The Dreaded Embedded (05/17/16 — 9:45 AM)
- Blair Semple
- Encryption Best Practices (05/18/16 — 1:30 PM)
- Bob Tahmaseb
- Stay One Step Ahead Without Compromising Security (05/18/16 — 9:45 AM)
- Bradley Ammerman and Tyler Burban
- {Sold Out} Hands-on Introduction to Network Pentesting (05/16/16 — 8:00 AM)
- Introduction to Network Pentesting (Presentation part ONLY) (05/16/16 — 8:00 AM)
- Brandon Cook
- Extending Data Protection/Compliance to O365 (05/17/16 — 11:00 AM)
- Creating a Control Point for the Cloud to Centralize Security in a De-Centralized World (05/18/16 — 3:00 PM)
- Brett Gravois
- How Low and Medium Vulnerabilities Can Own Your Site (05/17/16 — 9:45 AM)
- Brian Krebs
- Keynote: "Lessons from the Underground" with Brian Krebs (05/17/16 — 8:00 AM)
- Bryan Strawser
- Global Risk: Strategies for Uncertain Times (05/18/16 — 3:00 PM)
- Holy $#@! 60 Minutes is Outside! (05/18/16 — 1:30 PM)
- Chad Nordstrom
- Inside an Email Phishing Attack (05/17/16 — 4:15 PM)
- Chris Hernandez
- Modern Exploit Mitigation Bypass Techniques (05/17/16 — 1:30 PM)
- Improving Security with Adversary Simulation (05/17/16 — 3:00 PM)
- Dan Lyon
- Cybercrime Targets Medical: Motivations and Attacks (05/18/16 — 11:00 AM)
- Daniel Yang
- Click-jacking: Old Dogs, Cheap Tricks and Easy Fixes (05/18/16 — 11:00 AM)
- Derek Ardolf
- Why Learn PowerShell? Examples of Awesome (05/18/16 — 4:15 PM)
- Derek Dahlen
- How to Steal a Billion Dollars (05/17/16 — 11:00 AM)
- Deviant Ollam
- The Search for the Perfect Door (05/17/16 — 9:30 AM)
- Lock Picking Demo (05/17/16 — 2:40 PM)
- Douglas Hubbard
- How to Measure Anything in Cybersecurity Risk (05/17/16 — 9:30 AM)
- How to Measure Anything in Cybersecurity Risk (05/17/16 — 1:30 PM)
- Emily Duke
- Convergence of Law, Risk and IT Governance: Part 1 (05/17/16 — 3:00 PM)
- Convergence of Law, Risk and IT Governance: Part 2 (05/17/16 — 4:15 PM)
- Eric Sun
- Attack Chain Lessons: Bolster Your IR Program (05/18/16 — 11:00 AM)
- Erin Warhol
- Building a Vendor Risk Management Program (05/18/16 — 3:00 PM)
- Frank Catucci
- Click-jacking: Old Dogs, Cheap Tricks and Easy Fixes (05/18/16 — 11:00 AM)
- Fred Klapetzky
- Business Continuity, Patient Safety and Emergency Management for Healthcare (05/17/16 — 4:15 PM)
- Geno Pandolfi
- Ensuring Organizational and Enterprise Resiliency With Third Parties (05/17/16 — 1:30 PM)
- Geoff Glave
- Hedging Your Bets: A Layered Approach to Security (05/18/16 — 1:30 PM)
- Greg Gurevich
- Leveraging User Behavior Analytics for Inside-out Attacks (05/17/16 — 3:00 PM)
- Harry Regan
- It Can Always Get Worse (05/17/16 — 9:45 AM)
- Heidi Piche
- Attacking the BIA: Using A Proven and Effective Process (05/18/16 — 9:45 AM)
- James Lukaszewski
- Crisis Proofing Your Organization (05/18/16 — 4:15 PM)
- Jay Schulman
- Building Your Career in Security (05/17/16 — 1:30 PM)
- Jeff Hall
- Compliance Does Equal Security (05/18/16 — 3:00 PM)
- Jeff Purrington
- Minimizing Fraud Exposure Through ERP SODs (05/18/16 — 1:30 PM)
- Jeff Wells
- Changing the Security Paradigm (05/18/16 — 4:15 PM)
- Jeff Williams
- What?! My Security Tools Don't Work on APIs? (05/18/16 — 1:30 PM)
- Continuous Application Security at Scale with IAST and RASP (05/17/16 — 3:00 PM)
- Jeremy Wittkop
- The Future of Data Loss Prevention (05/18/16 — 9:45 AM)
- Jodi Schaubschlager
- Engaging Employees as Security Partners (05/18/16 — 4:15 PM)
- Joe Sturonas
- Encryption Doesn't Always Protect Your Data (05/17/16 — 4:15 PM)
- John Beeskow
- CISO Reboot (05/17/16 — 4:15 PM)
- John Grimm
- What Yesterday’s PKI Can Teach Us About Tomorrow’s Internet of Things (05/17/16 — 4:15 PM)
- Jon Heimerl
- Hacking the Person: Social Engineering/Phishing (05/17/16 — 3:00 PM)
- Josh Bressers
- Securing the Open Source Supply Chain (05/17/16 — 11:00 AM)
- Joshua Mau
- Leveraging Adaptive Authentication and Biometrics (05/18/16 — 4:15 PM)
- Keith Burkhardt
- Convergence of Law, Risk and IT Governance: Part 1 (05/17/16 — 3:00 PM)
- Convergence of Law, Risk and IT Governance: Part 2 (05/17/16 — 4:15 PM)
- Ken Shaurette
- Surviving the Mock Disaster: Building Effective Tabletop Exercises (05/17/16 — 11:00 AM)
- Regulation Roadmap of Behavior Analysis - Cyber Intelligence with UDAPE® (05/17/16 — 9:45 AM)
- Kit Welchlin
- STP: Stress, Time and Procrastination Management (05/18/16 — 9:30 AM)
- Kris Edinger & Mark Feil
- Resiliency Challenge - Carrier Hotels (05/18/16 — 11:00 AM)
- Laura Pigott
- Engaging Employees as Security Partners (05/18/16 — 4:15 PM)
- Louise Popyk
- Six Steps to Securing Privileged Access for Outsourced IT (05/17/16 — 1:30 PM)
- Marcus J. Ranum
- Establishing and Building a Security Metrics Program (05/18/16 — 1:30 PM)
- Marie Strawser and Scott Mulert
- Sharing a Proven Tabletop Exercise Format and Scenarios (05/17/16 — 3:00 PM)
- Matt DeMatteo
- The Battle for Your Endpoints (05/18/16 — 1:30 PM)
- Matt Hynes
- Adopting Economic Driven Security (05/17/16 — 9:45 AM)
- Melissa Harrison
- Building Your Professional Network Through Social Media (05/18/16 — 3:00 PM)
- Michael Bacon
- Leadership in Today's All Risk Environment (05/18/16 — 4:15 PM)
- Michael Belton
- Your Technical Defense Strategy is False (05/18/16 — 9:45 AM)
- Michael Rogers
- Getting the Job, Building a Career (05/18/16 — 1:30 PM)
- Michael Sutton
- Next Generation CISO: Everything a Modern CISO Needs to Know But is Afraid to Ask (05/17/16 — 9:45 AM)
- Michael Tierney
- Protecting Your Data When an Employee Leaves the Company (05/18/16 — 9:45 AM)
- Micheal Moshiri
- The Rise of Ransomware: Three Critical Steps To Prevent An Outbreak In Your Organization (05/17/16 — 11:00 AM)
- Mike Vizzi
- Forensic Residue: The Missing Link in Information Security (05/18/16 — 4:15 PM)
- Miles Brissette
- Social Media and Security Operations (05/18/16 — 11:00 AM)
- Natalie Vanatta
- Cyber Glossolalia (05/18/16 — 4:15 PM)
- Recruit and Retain Your Cybersecurity Workforce (05/18/16 — 11:00 AM)
- Patrick Kerpan
- Protecting Vital Data With NIST Framework (05/18/16 — 11:00 AM)
- Let's Rethink Cloud Application Security in 2016 (05/18/16 — 1:30 PM)
- Perry Hemmingsen
- Security Awareness... Much Ado About Nothing (05/17/16 — 1:30 PM)
- This Fog is really DeNSE (05/17/16 — 3:00 PM)
- Ryan Manship
- Are you RedTeam Secure? (05/17/16 — 9:45 AM)
- SA Lizabeth Lehrkamp
- What You Don’t Know About White Collar Crime (05/17/16 — 4:15 PM)
- Scott Erven
- Medical Devices: Pwnage and Honeypots (05/18/16 — 3:00 PM)
- Scott Sieracki
- Mitigating Threats via IT-centric Access Control (05/17/16 — 11:00 AM)
- Sean Harrington
- Closing the Gap: Information Security and Legal (05/16/16 — 8:00 AM)
- Seth Corder & Brian Brush
- Hack to the Basics - Attack and Defend Demo (05/17/16 — 11:00 AM)
- Hack to the Basics – Attack and Defend Demo (05/17/16 — 1:30 PM)
- Hack to the Basics – Attack and Defend Demo (05/18/16 — 9:45 AM)
- Shannon Lietz
- The End of Security as We Know It… (05/17/16 — 1:30 PM)
- Shaun Kelly
- What Time is It? Securing NTP (05/18/16 — 3:00 PM)
- Steve Currie
- Adopting Economic Driven Security (05/17/16 — 9:45 AM)
- Steve Surfaro
- Social Media and Security Operations (05/18/16 — 11:00 AM)
- Tennelle Anderson
- From Scavenger Hunt to Competitive Advantage (05/17/16 — 11:00 AM)
- The Keynote Panel
- Thomas Cocchiarella
- How to Plan your Career Development (05/18/16 — 9:45 AM)
- Tim Arvanites
- Gone Phishing: Cut the Line When Employees Get Hooked (05/17/16 — 3:00 PM)
- Tim White
- Take the Guesswork Out of Vulnerability Remediation With Qualys ThreatPROTECT (05/18/16 — 11:00 AM)
- Todd Bursch
- Building a Successful Program to Keep Insider Threats at Bay (05/18/16 — 3:00 PM)
- Travis Kaun
- crEAP - Harvesting Enterprise Wireless Users (05/17/16 — 3:00 PM)
- Tyson Macauley
- Securing the Internet of Things (05/18/16 — 9:45 AM)
- Valerie Thomas
- It Can Always Get Worse (05/17/16 — 9:45 AM)
- Yan Kravchenko
- The DIY Approach to Risk Assessments (05/17/16 — 4:15 PM)