- Monday, October 10, 2022
8:00 AM – 9:30 AM US PDT
Keynote Presentation - To be Announced
8:00 AM – 9:30 AM US PDT
The Power of CommunityCo-Speaker: – (ISC)²
Co-Speaker: – U.S. Department of Energy
Co-Speaker: – SCYTHE
Co-Speaker: – Women's Society of Cyberjutsu
Co-Speaker: – DataRobot
Clar Rosso – (ISC)² ### 1402015###Co-Speaker###CEO###(ISC)²###Co-Speaker: – (ISC)²
### @@@ Ann Dunkin – U.S. Department of Energy ### 1807128###Co-Speaker###Chief Information Officer###U.S. Department of Energy###Co-Speaker: – U.S. Department of Energy
### @@@ Bryson Bort – SCYTHE ### 1807129###Co-Speaker###Founder & CEO###SCYTHE###Co-Speaker: – SCYTHE
### @@@ Mari Galloway, BBACIS MSIS CISSP GIACx6 Pentest+ CySA+ Security+ IT Project+ CEH – Women's Society of Cyberjutsu ### 1062109###Co-Speaker###CEO; Sr Security Architect###Women's Society of Cyberjutsu###Co-Speaker: – Women's Society of Cyberjutsu
### @@@ Andrew Smeaton – DataRobot ### 1807132###Co-Speaker###Chief Information Security Officer###DataRobot###Co-Speaker: – DataRobot
### 9:30 AM – 10:00 AM US PDT
Exhibit Hall Opening & Break
9:30 AM – 10:00 AM US PDT
Exhibit Hall Opening & Break
10:00 AM – 10:50 AM US PDT
Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft Skills
10:00 AM – 10:50 AM US PDT
Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft SkillsSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
10:00 AM – 10:55 AM US PDT
Are Deepfakes Really a Security Threat?
10:00 AM – 10:55 AM US PDT
Are Deepfakes Really a Security Threat?Speaker: – Carnegie Mellon University
Security Automation/Artificial Intelligence/Machine Learning
Thomas P. Scanlon, CISSP – Carnegie Mellon University ### 373819###Speaker###Technical Manager - CERT Data Science###Carnegie Mellon University###Speaker: – Carnegie Mellon University
10:00 AM – 10:55 AM US PDT
Digital Governance: A Fireside Chat with IAPP and (ISC)²
10:00 AM – 10:55 AM US PDT
Digital Governance: A Fireside Chat with IAPP and (ISC)²Co-Speaker: – IAPP
Co-Speaker: – (ISC)²
Trevor Hughes – IAPP ### 1806597###Co-Speaker###CEO###IAPP###Co-Speaker: – IAPP
### @@@ Clar Rosso – (ISC)² ### 1402015###Co-Speaker###CEO###(ISC)²###Co-Speaker: – (ISC)²
### 10:00 AM – 10:55 AM US PDT
Effective Cybersecurity Board Reporting
10:00 AM – 10:55 AM US PDT
Effective Cybersecurity Board ReportingInformation Security Management
Kurt Manske – Kurt Manske ### 1663843###Speaker###Managing Principal###Kurt Manske###Speaker: – Kurt Manske
10:00 AM – 10:55 AM US PDT
Ethics Confidential: Inside the Inner-workings of the Ethics Committee
10:00 AM – 10:55 AM US PDT
Now More Than Ever: Ethics in CyberCo-Speaker: – Avanade
Co-Speaker: – (ISC)²
Professional & Career Development
Dan Houser, CISSP-ISSAP-ISSMP CSSLP CCSP – Avanade ### 1663856###Co-Speaker###Group Manager###Avanade###Co-Speaker: – Avanade
### @@@ Casey Marks – (ISC)² ### 1461405###Co-Speaker###Chief Qualifications Office###(ISC)²###Co-Speaker: – (ISC)²
### 10:00 AM – 10:55 AM US PDT
Fortify Your Cloud Security - Sponsored by Sysdig
10:00 AM – 10:55 AM US PDT
Fortify Your Cloud Security - Sponsored by Sysdig
Brett Wolmarans – Sysdig ### 1794165###Speaker###Technical Marketing Manager###Sysdig###Speaker: – Sysdig
### 10:00 AM – 10:55 AM US PDT
How to Proof of Concept (PoC) Cybersecurity tools
10:00 AM – 10:55 AM US PDT
How to Proof of Concept (PoC) Cybersecurity ToolsSecurity Architecture/Engineering
Alex Haynes, CISSP – IBS Software ### 1062088###Speaker###CISO###IBS Software###Speaker: – IBS Software
10:00 AM – 10:55 AM US PDT
Incident Response Ready - Key Steps of a Ransomware Incident Response Plan
10:00 AM – 10:55 AM US PDT
Incident Response Ready—Key Steps of a Ransomware Incident Response PlanIncident Response/Investigations/Forensics/E-Discovery
Joseph Carson, CISSP – Delinea ### 769663###Speaker###Chief Security Scientist & Advisory CISO###Delinea###Speaker: – Delinea
10:00 AM – 10:55 AM US PDT
OWASP Top 10 Risks
10:00 AM – 10:55 AM US PDT
Vandana Verma Sehgal – Snyk ### 1810483###Speaker###Security Leader###Snyk###Speaker: – Snyk
### 10:00 AM – 10:55 AM US PDT
Trust No One: Practical Zero-Trust for Cloud
10:00 AM – 10:55 AM US PDT
Trust No One: Practical Zero Trust for CloudSpeaker: – Amazon Web Services
Co-Speaker: – McKinsey & Company
Cloud Security
Joshua E. Bregler, CISSP, CCSP – Amazon Web Services ### 675287###Speaker###Security Architect, Department of Defense###Amazon Web Services###Speaker: – Amazon Web Services
@@@ Jeffrey Caso – McKinsey & Company ### 1762165###Co-Speaker###Associate Partner and Cyber Expert###McKinsey & Company###Co-Speaker: – McKinsey & Company
10:35 AM – 11:35 AM US PDT
Is Your Cloud Data Lurking in the Shadows?
10:35 AM – 11:35 AM US PDT
Is Your Cloud Data Lurking in the Shadows?Speaker: – Laminar Security
Andy Smith – Laminar Security ### 1795456###Speaker######Laminar Security###Speaker: – Laminar Security
### 11:05 AM – 12:00 PM US PDT
13 Keys to Unlock Mentoring Cybersecurity Interns
11:05 AM – 12:00 PM US PDT
13 Keys to Unlock Mentoring Cybersecurity InternsWorkforce Trends (Diversity/Recruiting)
Raymond Pompon, CISSP – Convera ### 1398142###Speaker###Director of Cybersecurity Programs###Convera###Speaker: – Convera
11:05 AM – 12:00 PM US PDT
A handful of needles in a million attack haystack: attack tree analysis of an ICS
11:05 AM – 12:00 PM US PDT
A Handful of Needles in a Million-Attack Haystack: Attack Tree Analysis of an ICSSpeaker: – Amenaza Technologies Limited
ICS/Critical Infrastructure
Terrance R. Ingoldsby, CISSP – Amenaza Technologies Limited ### 1398127###Speaker###President###Amenaza Technologies Limited###Speaker: – Amenaza Technologies Limited
11:05 AM – 12:00 PM US PDT
Dead Man's Hand: Mobile Application Threat Modeling
11:05 AM – 12:00 PM US PDT
Dead Man's Hand: Mobile Application Threat ModelingMobile Security
Richard Tychansky – N/A ### 373775###Speaker###Cloud Security Architect###N/A###Speaker: – N/A
11:05 AM – 12:00 PM US PDT
Impacting and actionable dashboards to monitor your security posture and engage with senior management
11:05 AM – 12:00 PM US PDT
Impactful, Actionable Dashboards to Monitor Your Security Posture and Improve Executive Engagement Governance, Regulation and Compliance
Florence-Stéphanie Bertaut – AXA France ### 1663832###Speaker###Deputy CSO###AXA France###Speaker: – AXA France
11:05 AM – 12:00 PM US PDT
Self-Protecting Data: An Artificial Intelligence Use Case
11:05 AM – 12:00 PM US PDT
Self-Protecting Data: An Artificial Intelligence Use CaseSpeaker: – Headquarters Cyberspace Capabilities Center (USAF)
Data Protection
Joseph DiGiovanni – Headquarters Cyberspace Capabilities Center (USAF) ### 1398174###Speaker###Branch Chief, Security Engineering###Headquarters Cyberspace Capabilities Center (USAF)###Speaker: – Headquarters Cyberspace Capabilities Center (USAF)
11:05 AM – 12:00 PM US PDT
So, you’re a new security leader, what now? … Build, Implement, and measure your success.
11:05 AM – 12:00 PM US PDT
So, You’re a New Security Leader. What now? Information Security Management
Cameron Fischer, CISSP CISM CRISC CEH GSTRT – Capital Power ### 1663820###Speaker###Director, Cyber Security & Architecture###Capital Power###Speaker: – Capital Power
11:05 AM – 12:00 PM US PDT
The Fourth Industrial Revolutions Impact on Cybersecurity Programs
11:05 AM – 12:00 PM US PDT
The Fourth Industrial Revolutions Impact on Cybersecurity ProgramsHuman Factors
James R. McQuiggan – KnowBe4 ### 762407###Speaker###Security Awareness Advocate###KnowBe4###Speaker: – KnowBe4
11:05 AM – 12:00 PM US PDT
The Intersection of Fraud Prevention and Cybersecurity
11:05 AM – 12:00 PM US PDT
The Intersection of Fraud Prevention and CybersecuritySpeaker: – Virtual CSO, LLC
Cyber Crime
Gideon T. Rasmussen – Virtual CSO, LLC ### 674941###Speaker###vCISO, Consulting Principal###Virtual CSO, LLC###Speaker: – Virtual CSO, LLC
### 11:05 AM – 12:00 PM US PDT
Women's Career Path in Digital Trust Industry 2022
11:05 AM – 12:00 PM US PDT
Women's Career Path in the Digital Trust Industry 2022Speaker: – PwC ConsultingLLC
Information Security Careers
Hiromi Aiko, CISSP, CISA, ISMS – PwC ConsultingLLC ### 1663827###Speaker###Researcher/ Senior Associate###PwC ConsultingLLC###Speaker: – PwC ConsultingLLC
12:00 PM – 12:50 PM US PDT
Lunch
12:00 PM – 12:50 PM US PDT
Lunch
12:50 PM – 2:20 PM US PDT
Town Hall
12:50 PM – 2:20 PM US PDT
Town HallModerator: – (ISC)²
Panelist: – Pacific Northwest National Laboratory
Panelist: – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization
Panelist: – (ISC)²
Clar Rosso – (ISC)² ### 1402015###Moderator###CEO###(ISC)²###Moderator: – (ISC)²
@@@ Lori Ross O'Neil, CISSP, PMP – Pacific Northwest National Laboratory ### 1398158###Panelist###Sr Cyber Security Researcher###Pacific Northwest National Laboratory###Panelist: – Pacific Northwest National Laboratory
@@@ Zachary Tudor, CISSP – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization ### 1461406###Panelist###Associate Laboratory Director###Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization###Panelist: – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization
@@@ Jon France, CISSP – (ISC)² ### 1757710###Panelist###Chief Information Security Officer###(ISC)²###Panelist: – (ISC)²
1:00 PM – 1:50 PM US PDT
Career Center Series: 10 Things Every Job Seeker Should Know
1:00 PM – 1:50 PM US PDT
Career Center Series: 10 Things Every Job Seeker Should KnowSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
2:00 PM – 2:50 PM US PDT
Career Center Series: Military Transition Success
2:00 PM – 2:50 PM US PDT
Career Center Series: Military Transition SuccessSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
### 2:30 PM – 3:30 PM US PDT
An Insider View of CISA's ICT Supply Chain Risk Management (SCRM) Task Force
2:30 PM – 3:30 PM US PDT
An Insider View of CISA's ICT Supply Chain Risk Management Task ForceSupply Chain Security
Chad Kliewer, MS, CISSP, CCSP – (ISC)² ### 1398171###Speaker###Education CPE Evaluator Lead###(ISC)²###Speaker: – (ISC)²
2:30 PM – 3:30 PM US PDT
Creating a Behavioral Cybersecurity Program
2:30 PM – 3:30 PM US PDT
Creating a Behavioral Cybersecurity ProgramHuman Factors
Ira Winkler, CISSP – Walmart ### 361691###Speaker###Chief Security Architect###Walmart###Speaker: – Walmart
2:30 PM – 3:30 PM US PDT
'Fail to Plan = Plan to Fail' - Preparing For Your Cybersecurity Incident Response
2:30 PM – 3:30 PM US PDT
'Fail to Plan = Plan to Fail': Preparing for Your Cybersecurity Incident ResponseIncident Response/Investigations/Forensics/E-Discovery
Alice Fakir – IBM ### 1779469###Speaker###Account Partner, Federal Security Services North America###IBM###Speaker: – IBM
### 2:30 PM – 3:30 PM US PDT
No More Sodinokibi - A Hybrid Software Application for Detecting the REvil/Sodinokibi Ransomware
2:30 PM – 3:30 PM US PDT
No More Sodinokibi —A Hybrid Software Application for Detecting the REvil/Sodinokibi RansomwareRansomware
Mauricio Bezerra, CISSP – AWS ### 1663810###Speaker###Senior Consultant###AWS###Speaker: – AWS
2:30 PM – 3:30 PM US PDT
Rejuvenating or Reforming Your Chapter
2:30 PM – 3:30 PM US PDT
Rejuvenating or Reforming Your ChapterSpeaker: – ISC2 NJ Chapter
Professional & Career Development
Ken Fishkin, CISSP, CCSP, CIPP/US, CIPM, CIPT – ISC2 NJ Chapter ### 532529###Speaker###President###ISC2 NJ Chapter###Speaker: – ISC2 NJ Chapter
2:30 PM – 3:30 PM US PDT
Security metrics - how to measure it efficiently
2:30 PM – 3:30 PM US PDT
Security Metrics —How to Measure Them EfficientlySpeaker: – Locked Jar PTE. LTD.
Information Security Management
Ilia Tivin – Locked Jar PTE. LTD. ### 1663800###Speaker###Founder###Locked Jar PTE. LTD.###Speaker: – Locked Jar PTE. LTD.
2:30 PM – 3:30 PM US PDT
So you want to be an expert witness
2:30 PM – 3:30 PM US PDT
So You Want to be an Expert WitnessProfessional & Career Development
Hoyt L. Kesterson, II, QSA, CISSP, CISA – Avertium ### 1398200###Speaker###Senior Security & Risk Architect###Avertium###Speaker: – Avertium
### 2:30 PM – 3:30 PM US PDT
Top public cloud security fails and how to avoid them
2:30 PM – 3:30 PM US PDT
Top Public Cloud Security Fails and How to Avoid ThemCloud Security
Karl Ots, CISSP – EPAM Systems ### 1398140###Speaker###Head of Cloud Security###EPAM Systems###Speaker: – EPAM Systems
2:30 PM – 3:30 PM US PDT
Zero Trust Is The Only Security Strategy
2:30 PM – 3:30 PM US PDT
Zero Trust Is the Only Security StrategyZero Trust
George Finney – SMU ### 1663823###Speaker###Chief Security Officer###SMU###Speaker: – SMU
### 3:00 PM – 3:50 PM US PDT
Career Center Series: Virtual Job Fair Success
3:00 PM – 3:50 PM US PDT
Career Center Series: Virtual Job Fair SuccessSpeaker: – ClearedJobs.net
Professional & Career Development
Courtney Schwarten – ClearedJobs.net ### 1759973###Speaker###Career Coach###ClearedJobs.net###Speaker: – ClearedJobs.net
3:30 PM – 4:00 PM US PDT
Exhibit Hall Break
3:30 PM – 4:00 PM US PDT
Exhibit Hall & Break
3:50 PM – 4:10 PM US PDT
Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
3:50 PM – 4:10 PM US PDT
Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
Bryce Fountaine ### 1807090###Speaker#########Speaker:
### 4:00 PM – 5:00 PM US PDT
Against All Odds: Cloud SaaS Attack Surface Management
4:00 PM – 5:00 PM US PDT
Against All Odds: Cloud SaaS Attack Surface ManagementAttack Surface Management
Richard Tychansky – N/A ### 373775###Speaker###Cloud Security Architect###N/A###Speaker: – N/A
4:00 PM – 5:00 PM US PDT
All About That Data: How Data Security and Management Will Rule The World
4:00 PM – 5:00 PM US PDT
All About That Data: How Data Security and Management Will Rule The WorldData Protection
Andrew Neal, MSc, CCFP, C|CISO,CISM,CRISC – Gartner ### 373785###Speaker###VP Research###Gartner###Speaker: – Gartner
4:00 PM – 5:00 PM US PDT
Best Practices for Managing & Preventing Insider Threats from Interviewing Experts
4:00 PM – 5:00 PM US PDT
Best Practices for Managing and Preventing Insider Threats from Interviewing ExpertsSpeaker: – Dennehy Services
Insider Threat(s)
Michael J. Dennehy, CISSP, CCSP, CISM, PMP, CISA – Dennehy Services ### 1663818###Speaker###Cybersecurity Architect Director###Dennehy Services###Speaker: – Dennehy Services
4:00 PM – 5:00 PM US PDT
Cyber Risk Metrics & Reporting
4:00 PM – 5:00 PM US PDT
Cyber Risk Metrics and ReportingInformation Security Management
Priya Mouli, MBA, CDPSE, CISSP – PwC ### 1663799###Speaker###Director, Cybersecurity and Privacy###PwC###Speaker: – PwC
4:00 PM – 5:00 PM US PDT
How to Create Effective and Engaging Cybersecurity Training for Employees
4:00 PM – 5:00 PM US PDT
How to Create Effective and Engaging Cybersecurity Training for EmployeesWorkforce Trends (Diversity/Recruiting)
Matthew J. McMahon – Philips ### 1663829###Speaker###Sr Product Manager of Cybersecurity###Philips###Speaker: – Philips
4:00 PM – 5:00 PM US PDT
Introduction to Threat Hunting
4:00 PM – 5:00 PM US PDT
Introduction to Threat HuntingThreats (Detection/Hunting/Intelligence/Mitigation/Monitoring)
Rahul Anand – HAMBS ### 1663849###Speaker###Cyber Security Manager###HAMBS###Speaker: – HAMBS
4:00 PM – 5:00 PM US PDT
Plugging the gaps in cybersecurity with a Shift Left strategy
4:00 PM – 5:00 PM US PDT
Plugging the Gaps in Cybersecurity with a Shift Left StrategyDevSecOps
Parul Khanna, MS CISSP CCSP CISM CRISC CDPSE CCSK – Manulife ### 1398201###Speaker###Senior Consultant###Manulife###Speaker: – Manulife
4:00 PM – 5:00 PM US PDT
Three Simple and Effective Cybersecurity Exercises
4:00 PM – 5:00 PM US PDT
Three Simple and Effective Cybersecurity ExercisesCo-Speaker: – Secureworks
Co-Speaker: – Secureworks
Information Security Management
Robert Lelewski, CISSP, CISSP-ISSMP, CISA, CISM, CRISC, CFPSE, EnCE, CCE, CIPM, and GCIH – Secureworks ### 1663814###Co-Speaker###Director###Secureworks###Co-Speaker: – Secureworks
@@@ John Hollenberger, CISSP, GCIH, GWAPT – Secureworks ### 1663815###Co-Speaker###Advisor, IT Security###Secureworks###Co-Speaker: – Secureworks
4:00 PM – 5:00 PM US PDT
Vulnerability Management is Dead! Long Live Vulnerability Management!
4:00 PM – 5:00 PM US PDT
Vulnerability Management is Dead! Long Live Vulnerability Management!Speaker: – Allstate Insurance Company
Co-Speaker: – University Of Maryland Global Campus
Network Security
Ethan Wilder, M.S, CISSP – Allstate Insurance Company ### 1663830###Speaker###Sr Manager Product Security###Allstate Insurance Company###Speaker: – Allstate Insurance Company
@@@ Sudesh Kannan, PhD, CISSP, CISM, CIPP(US) – University Of Maryland Global Campus ### 1663831###Co-Speaker###Adjunct Professor###University Of Maryland Global Campus###Co-Speaker: – University Of Maryland Global Campus
6:00 PM – 8:30 PM US PDT
Networking Extravaganza
6:00 PM – 8:30 PM US PDT
Networking Extravaganza
- Tuesday, October 11, 2022
7:00 AM – 8:00 AM US PDT
Breakfast
7:00 AM – 8:00 AM US PDT
Breakfast
8:00 AM – 9:00 AM US PDT
Keynote Presentation - Cybersecurity Insights
8:00 AM – 9:00 AM US PDT
Keynote Presentation - Cybersecurity InsightsSpeaker: – Founding Chief Executive of UK National Cyber Security Centre
Ciaran Martin – Founding Chief Executive of UK National Cyber Security Centre ### 1757712###Speaker######Founding Chief Executive of UK National Cyber Security Centre###Speaker: – Founding Chief Executive of UK National Cyber Security Centre
### 9:05 AM – 10:05 AM US PDT
Keynote Presentation - Inside “The Infiltrator”: How Ethics and Teamwork Shaped the Life (and Near Death) of an Undercover Operator in the Colombian Cartel Underworld
9:05 AM – 10:05 AM US PDT
Keynote Presentation - Inside “The Infiltrator”: How Ethics and Teamwork Shaped the Life (and Near Death) of an Undercover Operator in the Colombian Cartel UnderworldSpeaker: – New York Times Bestselling Author of "The Infiltrator"
Robert Mazur – New York Times Bestselling Author of "The Infiltrator" ### 1757639###Speaker###New York Times Bestselling Author of###New York Times Bestselling Author of "The Infiltrator"###Speaker: – New York Times Bestselling Author of "The Infiltrator"
### 10:00 AM – 10:50 AM US PDT
Career Center Series: Conference Presenting: The Art of Leadership and Soft Skills Development Through Presentation
10:00 AM – 10:50 AM US PDT
Career Center Series: Conference Presenting: The Art of Leadership and Soft Skills Development Through PresentationProfessional & Career Development
Steven Bernstein – USAA ### 1759974###Speaker###Senior Security Advisor###USAA###Speaker: – USAA
10:05 AM – 10:35 AM US PDT
Exhibit Hall & Break
10:05 AM – 10:35 AM US PDT
Exhibit Hall & Break
10:35 AM – 11:35 AM US PDT
A Fireside Chat with CISA and ISC2
10:35 AM – 11:35 AM US PDT
Perspectives on Cybersecurity: A Fireside Chat with (ISC)2 and CISAPanelist: – (ISC)²
Panelist: – CISA (Cybersecurity & Infrastructure Security Agency)
Privacy
Clar Rosso – (ISC)² ### 1402015###Panelist###CEO###(ISC)²###Panelist: – (ISC)²
### @@@ David Mussington – CISA (Cybersecurity & Infrastructure Security Agency) ### 1792357###Panelist###Executive Director for Infrastructure###CISA (Cybersecurity & Infrastructure Security Agency)###Panelist: – CISA (Cybersecurity & Infrastructure Security Agency)
### 10:35 AM – 11:35 AM US PDT
Cybersecurity & Third-Party Risk: Third Party Threat Hunting
10:35 AM – 11:35 AM US PDT
Cybersecurity and Third-Party Risk: Third-Party Threat HuntingSpeaker: – Truist Financial Corp.
3rd Party Risk
Gregory Rasner, CISSP, CCNA, CIPM, ITIL – Truist Financial Corp. ### 1663813###Speaker###Author of "Cybersecurity & Third-Party Risk" and SVP, Cybersecurity###Truist Financial Corp.###Speaker: – Truist Financial Corp.
10:35 AM – 11:35 AM US PDT
Everything I know about Compliance I learned from Patrick Swayze in Road House
10:35 AM – 11:35 AM US PDT
Everything I know about Compliance I Learned from Patrick Swayze in Road HouseGovernance, Regulation and Compliance
Caroline E. Saxon – CoreCivic ### 1398179###Speaker###Director, Information Security Compliance###CoreCivic###Speaker: – CoreCivic
10:35 AM – 11:35 AM US PDT
How to diversity your cybersecurity teams
10:35 AM – 11:35 AM US PDT
How to Diversify Your Cybersecurity TeamsSpeaker: – Blacks United in Leading Technology International
Information Security Careers
Peter Beasley – Blacks United in Leading Technology International ### 1663860###Speaker###Co-Founder and Executive Director###Blacks United in Leading Technology International###Speaker: – Blacks United in Leading Technology International
10:35 AM – 11:35 AM US PDT
How to Establish a (successful) Security Strategy from Scratch
10:35 AM – 11:35 AM US PDT
How to Establish a (Successful) Security Strategy from ScratchInformation Security Management
Esther Pinto – anecdotes ### 1663811###Speaker###CISO & DPO###anecdotes###Speaker: – anecdotes
### 10:35 AM – 11:35 AM US PDT
Let's handle that GDPR data breach!
10:35 AM – 11:35 AM US PDT
Let's Handle that GDPR Data BreachData Protection
Laurie-Anne Bourdain, CISSP, FIP, CIPP/E, CIPM, CDPSE, DPO – Isabel Group ### 1398092###Speaker###Data Protection Officer###Isabel Group###Speaker: – Isabel Group
10:35 AM – 11:35 AM US PDT
Perspectives on Cybersecurity: A Fireside Chat with (ISC)2 and CISA
10:35 AM – 11:35 AM US PDT
Perspectives on Cybersecurity: A Fireside Chat with (ISC)2 and CISAModerator: – (ISC)²
Panelist: – CISA (Cybersecurity & Infrastructure Security Agency)
Clar Rosso – (ISC)² ### 1402015###Moderator###CEO###(ISC)²###Moderator: – (ISC)²
### @@@ David Mussington – CISA (Cybersecurity & Infrastructure Security Agency) ### 1792357###Panelist###Executive Director for Infrastructure###CISA (Cybersecurity & Infrastructure Security Agency)###Panelist: – CISA (Cybersecurity & Infrastructure Security Agency)
### 10:35 AM – 11:35 AM US PDT
Privacy-Preserving Analytics and Secure Multiparty Computation
10:35 AM – 11:35 AM US PDT
Privacy-Preserving Analytics and Secure Multi-party ComputationCloud Security
Ulf Mattsson – Protegrity ### 1663842###Speaker###Chief Security Strategist###Protegrity###Speaker: – Protegrity
10:35 AM – 11:35 AM US PDT
Software Bills of Materials (SBOMs) and other things that can go wrong...
10:35 AM – 11:35 AM US PDT
Software Bills of Materials and Other Things that Can Go WrongSpeaker: – Micro Focus International
Supply Chain Security
Michael F. Angelo, CISSP, CRISC, CDPSE – Micro Focus International ### 1062087###Speaker###Chief Security Architect###Micro Focus International###Speaker: – Micro Focus International
10:35 AM – 11:35 AM US PDT
What to expect when you are expecting…. your CISO to leave.
10:35 AM – 11:35 AM US PDT
What to Expect When You Are Expecting ... Your CISO to LeaveInformation Security Management
Kurt Manske – Kurt Manske ### 1663843###Speaker###Managing Principal###Kurt Manske###Speaker: – Kurt Manske
11:45 AM – 12:45 PM US PDT
A Deep Dive into the Legalities of the NSO Group and Pegasus Software
11:45 AM – 12:45 PM US PDT
A Deep Dive into the Legalities of the NSO Group and Pegasus SoftwareCo-Speaker: – Spirion, LLC
Co-Speaker: – Baker Hostetler
Co-Speaker: – Fortune 500 company
Co-Speaker:
Privacy
Scott M. Giordano, CISSP, CCSP – Spirion, LLC ### 1062095###Co-Speaker###V.P., Corporate Privacy, and General Counsel###Spirion, LLC###Co-Speaker: – Spirion, LLC
### @@@ Adam Cohen – Baker Hostetler ### 1663833###Co-Speaker###Counsel###Baker Hostetler###Co-Speaker: – Baker Hostetler
### @@@ David Patariu – Fortune 500 company ### 1663835###Co-Speaker###Legal Director - Technology, Data Privacy, and Cybersecurity###Fortune 500 company###Co-Speaker: – Fortune 500 company
### @@@ Roy Zur ### 1794502###Co-Speaker###CEO Enterprise Division######Co-Speaker:
### 11:45 AM – 12:45 PM US PDT
Considering culture in your cyber strategy
11:45 AM – 12:45 PM US PDT
Considering Culture in Your Cyber StrategyHuman Factors
Marco Túlio Moraes – OITI ### 1663817###Speaker###CISO###OITI###Speaker: – OITI
11:45 AM – 12:45 PM US PDT
Enterprise Security Risk Assessment (ESRA)
11:45 AM – 12:45 PM US PDT
Enterprise Security Risk Assessment (ESRA)Governance, Regulation and Compliance
Julian Talbot, CISSP – SECTARA ### 1398088###Speaker###Chief Technology Officer###SECTARA###Speaker: – SECTARA
11:45 AM – 12:45 PM US PDT
Get real about Cloud Incident Response
11:45 AM – 12:45 PM US PDT
Get Real About Cloud Incident ResponseIncident Response/Investigations/Forensics/E-Discovery
Kristy Westphal, CISSP, CISA, CRISC, CISM, CIPP/US – HealthEquity ### 373771###Speaker###VP Security Operations###HealthEquity###Speaker: – HealthEquity
11:45 AM – 12:45 PM US PDT
Hacking Gamification – Going from Zero to Privileged PWNED
11:45 AM – 12:45 PM US PDT
Hacking Gamification – Going from Zero to Privileged PWNEDProfessional & Career Development
Joseph Carson, CISSP – Delinea ### 769663###Speaker###Chief Security Scientist & Advisory CISO###Delinea###Speaker: – Delinea
11:45 AM – 12:45 PM US PDT
Improving Cybersecurity Posture in Critical Infrastructure
11:45 AM – 12:45 PM US PDT
Improving Cybersecurity Posture in Critical InfrastructureICS/Critical Infrastructure
Saltanat Mashirova, CISSP, GICSP, CISA, CISM, TOGAF – Honeywell ### 1663846###Speaker###Advanced Cyber Security Architect/Engineer###Honeywell###Speaker: – Honeywell
11:45 AM – 12:45 PM US PDT
Modeling Security Architectures with ArchiMate 3.1
11:45 AM – 12:45 PM US PDT
Modeling Security Architectures with ArchiMate 3.1Security Architecture/Engineering
Les Hardin, MBA, CISSP-ISSAP, CCSP – Humana, Inc. ### 373672###Speaker###Director, Cloud & Architecture###Humana, Inc.###Speaker: – Humana, Inc.
11:45 AM – 12:45 PM US PDT
Next Gen IAM and PAM with SOAR and AI
11:45 AM – 12:45 PM US PDT
Next-Gen IAM and PAM with SOAR and AIIdentity/Authentication/Access Management
Pierre Magnan, CISSP – IBM Canada ### 1663848###Speaker###IAM Premier Consultant###IBM Canada###Speaker: – IBM Canada
11:45 AM – 12:45 PM US PDT
Ready for the next frontier in IAM strategy? - sponsored by Keyfactor
11:45 AM – 12:45 PM US PDT
Ready for the next frontier in IAM strategy? - sponsored by Keyfactor
Chris Hickman – Keyfactor ### 1804453###Speaker###Chief Security Officer###Keyfactor###Speaker: – Keyfactor
### 11:45 AM – 12:45 PM US PDT
Security Automation: That which can be done for you...
11:45 AM – 12:45 PM US PDT
Security Automation: That Which Can Be Done For YouSpeaker: – Garnet River, LLC
Security Automation/Artificial Intelligence/Machine Learning
Michael D. Weisberg, CISSP – Garnet River, LLC ### 512701###Speaker###CISO and VP of Information Security and Assurance Services###Garnet River, LLC###Speaker: – Garnet River, LLC
12:00 PM – 12:50 PM US PDT
Career Center Series: Top Tips for Using Social Media in Your Job Search
12:00 PM – 12:50 PM US PDT
Career Center Series: Top Tips for Using Social Media in Your Job SearchSpeaker: – ClearedJobs.net
Professional & Career Development
Courtney Schwarten – ClearedJobs.net ### 1759973###Speaker###Career Coach###ClearedJobs.net###Speaker: – ClearedJobs.net
12:45 PM – 1:35 PM US PDT
Lunch
12:45 PM – 1:35 PM US PDT
Lunch
1:00 PM – 1:50 PM US PDT
Career Center Series: How to Succeed at Technical Interviews
1:00 PM – 1:50 PM US PDT
Career Center Series: How to Succeed at Technical Interviews Speaker: – Accenture Federal Services
Professional & Career Development
Kirsten Renner – Accenture Federal Services ### 1759975###Speaker###Senior Recruiting Manager, National Security Portfolio###Accenture Federal Services###Speaker: – Accenture Federal Services
1:35 PM – 2:35 PM US PDT
A Metaverse of Insecurity
1:35 PM – 2:35 PM US PDT
A Metaverse of InsecurityHuman Factors
Ira Winkler, CISSP – Walmart ### 361691###Speaker###Chief Security Architect###Walmart###Speaker: – Walmart
1:35 PM – 2:35 PM US PDT
Avoid Being the Middle Child - Ensuring Sec gets the Attention and Resources in DevSecOps
1:35 PM – 2:35 PM US PDT
Avoid Being the Middle Child - Ensuring Sec gets the Attention and Resources in DevSecOpsSpeaker: – Booz Allen Hamilton
DevSecOps
Andrew Boyle, CISSP, CEH, PMP, PMI-ACP, SAFe SPC/SA, PRINCE2, AWS-SAA, FinOps CP, NN/g UXC – Booz Allen Hamilton ### 675289###Speaker###Director and Distinguished Digital & Cyber Technologist###Booz Allen Hamilton###Speaker: – Booz Allen Hamilton
1:35 PM – 2:35 PM US PDT
Cybersecurity Legal Considerations for the Russia/Ukraine War
1:35 PM – 2:35 PM US PDT
Cybersecurity Legal Considerations for the Russia-Ukraine WarCo-Speaker: – Spirion, LLC
Co-Speaker: – Baker Hostetler
Co-Speaker: – Fortune 500 company
Co-Speaker:
Governance, Regulation and Compliance
Scott M. Giordano, CISSP, CCSP – Spirion, LLC ### 1062095###Co-Speaker###V.P., Corporate Privacy, and General Counsel###Spirion, LLC###Co-Speaker: – Spirion, LLC
### @@@ Adam Cohen – Baker Hostetler ### 1663833###Co-Speaker###Counsel###Baker Hostetler###Co-Speaker: – Baker Hostetler
### @@@ David Patariu – Fortune 500 company ### 1663835###Co-Speaker###Legal Director - Technology, Data Privacy, and Cybersecurity###Fortune 500 company###Co-Speaker: – Fortune 500 company
### @@@ Roy Zur ### 1794502###Co-Speaker###CEO Enterprise Division######Co-Speaker:
### 1:35 PM – 2:35 PM US PDT
Healthcare Hacked! Culture, Costs, and Cures
1:35 PM – 2:35 PM US PDT
Healthcare Hacked! Culture, Costs and CuresSpeaker: – Change Healthcare
Information Security Management
Wm Gregg Bridgeman, CISSP, PMP, GCIH, GISCP, GPEN, and C|eH – Change Healthcare ### 1663805###Speaker###Manager Health IT Security & Risk###Change Healthcare###Speaker: – Change Healthcare
1:35 PM – 2:35 PM US PDT
Hiring a team: Where is the Draft class?
1:35 PM – 2:35 PM US PDT
Hiring a Team: Where is the Draft Class?Co-Speaker: – Chipotle Mexican Grill
Information Security Careers
Shawn A. Harris, CISSP-ISSAP, CCSP – Chipotle Mexican Grill ### 762401###Co-Speaker###Senior Director, Information Security###Chipotle Mexican Grill###Co-Speaker: – Chipotle Mexican Grill
### 1:35 PM – 2:35 PM US PDT
Personal Resilience, Risk Based Approach to a Cyber Career with no Cyber Qualifications or Experience
1:35 PM – 2:35 PM US PDT
Personal Resilience: A Risk-Based Approach to a Cyber Career with No Cyber Qualifications or ExperienceWorkforce Trends (Diversity/Recruiting)
Melanie Oldham, OBE – UKC3 & YCSC ### 1663839###Speaker###Vice Chair & Director###UKC3 & YCSC###Speaker: – UKC3 & YCSC
1:35 PM – 2:35 PM US PDT
What it takes to build and maintain secure digital products?
1:35 PM – 2:35 PM US PDT
What It Takes to Build and Maintain Secure Digital ProductsSpeaker: – Intel Corporation
Application Security/ Software Assurance
Sarba Roy, CISSP – Intel Corporation ### 1663819###Speaker###Governance - Product Security Engineer###Intel Corporation###Speaker: – Intel Corporation
1:35 PM – 2:35 PM US PDT
Why Your Employees Hate Information Security
1:35 PM – 2:35 PM US PDT
Why Your Employees Hate Information SecuritySpeaker: – George Washington University MFA
Security Awareness/Training
David G. Brown, MBA, CISSP, PMP – George Washington University MFA ### 1663804###Speaker###Director of Information Security###George Washington University MFA###Speaker: – George Washington University MFA
1:35 PM – 2:35 PM US PDT
Zero Trust Networking: Betting on mTLS to Secure Cloud Native Services
1:35 PM – 2:35 PM US PDT
Zero Trust Networking: Betting on mTLS to Secure Cloud Native ServicesZero Trust
Richard Tychansky – N/A ### 373775###Speaker###Cloud Security Architect###N/A###Speaker: – N/A
2:00 PM – 2:50 PM US PDT
Career Center Series: Turbocharge Your Military Resumes by Converting to Civilian Speak
2:00 PM – 2:50 PM US PDT
Career Center Series: Turbocharge Your Military Resumes by Converting to Civilian Speak Speaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
2:45 PM – 3:45 PM US PDT
Achieving Data Security and Analytics with AI
2:45 PM – 3:45 PM US PDT
Achieving Data Security and Analytics with AISpeaker: – Virginia Dept of Behavioral Health and Developmental Services
Security Automation/Artificial Intelligence/Machine Learning
Glendon Schmitz – Virginia Dept of Behavioral Health and Developmental Services ### 1663847###Speaker###CISO###Virginia Dept of Behavioral Health and Developmental Services###Speaker: – Virginia Dept of Behavioral Health and Developmental Services
2:45 PM – 3:45 PM US PDT
Can you "Shift Left" Compliance? - sponsored by RegScale
2:45 PM – 3:45 PM US PDT
Can you "Shift Left" Compliance? - sponsored by RegScale
Anil Karmel – RegScale ### 1805809###Speaker###Co-Founder and CEO###RegScale###Speaker: – RegScale
### 2:45 PM – 3:45 PM US PDT
Detect Better and Respond Faster to Cyber Attacks
2:45 PM – 3:45 PM US PDT
Detect Better and Respond Faster to Cyber AttacksThreats (Detection/Hunting/Intelligence/Mitigation/Monitoring)
Sunil Sharma – Help AG ### 1663855###Speaker###Director###Help AG###Speaker: – Help AG
2:45 PM – 3:45 PM US PDT
Mentalism, Magic & CyberSecurity
2:45 PM – 3:45 PM US PDT
Mentalism, Magic and CybersecurityCo-Speaker: – KnowBe4
Speaker: – Micro Focus International
Human Factors
James R. McQuiggan – KnowBe4 ### 762407###Co-Speaker###Security Awareness Advocate###KnowBe4###Co-Speaker: – KnowBe4
@@@ Michael F. Angelo, CISSP, CRISC, CDPSE – Micro Focus International ### 1062087###Speaker###Chief Security Architect###Micro Focus International###Speaker: – Micro Focus International
2:45 PM – 3:45 PM US PDT
Today's Incident is Tomorrow's Litigation
2:45 PM – 3:45 PM US PDT
Today's Incident is Tomorrow's LitigationCo-Speaker: – Arete Incident Response
Co-Speaker: – Arete Incident Response
Incident Response/Investigations/Forensics/E-Discovery
Charles Platt, MBA, EnCE, CCSP, CISSP, ISSMP, CEH – Arete Incident Response ### 762300###Co-Speaker###Sr. Director of Incident Response, Forensics, and Solutions###Arete Incident Response###Co-Speaker: – Arete Incident Response
@@@ Louis Martin – Arete Incident Response ### 1398125###Co-Speaker###Director of Forensics###Arete Incident Response###Co-Speaker: – Arete Incident Response
2:45 PM – 3:45 PM US PDT
Using Augmented Reality to Conduct Virtual Inventories of Real Assets
2:45 PM – 3:45 PM US PDT
Using Augmented Reality to Conduct Virtual Inventories of Real AssetsSpeaker: – Pacific Northwest National Laboratory
Mobile Security
Lori Ross O'Neil, CISSP, PMP – Pacific Northwest National Laboratory ### 1398158###Speaker###Sr Cyber Security Researcher###Pacific Northwest National Laboratory###Speaker: – Pacific Northwest National Laboratory
2:45 PM – 3:45 PM US PDT
Why Your Personal Infosec Brand Matters
2:45 PM – 3:45 PM US PDT
Why Your Personal Infosec Brand MattersCo-Speaker: – Trellix
Co-Speaker: – Schneider-Electric
Professional & Career Development
Rob Ayoub, CISSP – Trellix ### 762423###Co-Speaker###Senior Product Marketing Manager###Trellix###Co-Speaker: – Trellix
@@@ John Esparza, CISSP, ISSAP – Schneider-Electric ### 894845###Co-Speaker###Data Center Software Consultant###Schneider-Electric###Co-Speaker: – Schneider-Electric
3:45 PM – 4:15 PM US PDT
Exhibit Hall & Break
3:45 PM – 4:15 PM US PDT
Exhibit Hall & Break
3:50 PM – 4:10 PM US PDT
Solutions Theater Presentation - Securing DevOps in the Cloud with Privileged Access Management (PAM) (NO CPE)
3:50 PM – 4:10 PM US PDT
Solutions Theater Presentation - Securing DevOps in the Cloud with Privileged Access Management (PAM) (NO CPE)
Julien Cassignol – Wallix ### 1795441###Speaker######Wallix###Speaker: – Wallix
### 4:00 PM – 4:50 PM US PDT
Career Center Series: Envisioning Your Executive Career Path
4:00 PM – 4:50 PM US PDT
Career Center Series: Envisioning Your Executive Career Path Co-Speaker: – Tiro Security
Co-Speaker: – Chipotle Mexican Grill
Co-Speaker: – Tiro Security
Professional & Career Development
Kris Rides – Tiro Security ### 1062082###Co-Speaker###CEO###Tiro Security###Co-Speaker: – Tiro Security
@@@ Shawn A. Harris, CISSP-ISSAP, CCSP – Chipotle Mexican Grill ### 762401###Co-Speaker###Senior Director, Information Security###Chipotle Mexican Grill###Co-Speaker: – Chipotle Mexican Grill
@@@ Jenai Marinkovic – Tiro Security ### 1460559###Co-Speaker###vCISO/CTO###Tiro Security###Co-Speaker: – Tiro Security
4:15 PM – 5:15 PM US PDT
Avoiding Cybersecurity Achilles' Heels with Application Programming Interfaces (APIs)
4:15 PM – 5:15 PM US PDT
Avoiding Cybersecurity Achilles' Heels with Application Programming Interfaces (APIs)Speaker: – Booz Allen Hamilton
Security Architecture/Engineering
Andrew Boyle, CISSP, CEH, PMP, PMI-ACP, SAFe SPC/SA, PRINCE2, AWS-SAA, FinOps CP, NN/g UXC – Booz Allen Hamilton ### 675289###Speaker###Director and Distinguished Digital & Cyber Technologist###Booz Allen Hamilton###Speaker: – Booz Allen Hamilton
4:15 PM – 5:15 PM US PDT
Breaking Barriers -- Climbing the Ladder and Breaking the Glass Ceiling for Women in Cybersecurity
4:15 PM – 5:15 PM US PDT
Breaking Barriers: Climbing the Ladder and Breaking the Glass Ceiling for Women in CybersecuritySpeaker: – Akamai Technologies
Workforce Trends (Diversity/Recruiting)
Lauren Van Wazer, CISSP – Akamai Technologies ### 1663854###Speaker###Vice President, Global Public Policy and Regulatory Affairs###Akamai Technologies###Speaker: – Akamai Technologies
4:15 PM – 5:15 PM US PDT
Career Benefits in Cybersecurity Apprenticeships
4:15 PM – 5:15 PM US PDT
Career Benefits in Cybersecurity ApprenticeshipsPanel Moderator: – Gartner
Panelist: – McLeod Information Systems
Panelist: – New America
Panelist: – USDOL/Office of Apprenticeship
Information Security Careers
Brandon Dunlap – Gartner ### 373810###Panel Moderator###n/a###Gartner###Panel Moderator: – Gartner
### @@@ Rodney McLeod – McLeod Information Systems ### 1398134###Panelist###CEO###McLeod Information Systems###Panelist: – McLeod Information Systems
### @@@ Mike Prebil – New America ### 1663838###Panelist###Policy Analyst###New America###Panelist: – New America
### @@@ Douglas Howell – USDOL/Office of Apprenticeship ### 1761184###Panelist###California State Director###USDOL/Office of Apprenticeship###Panelist: – USDOL/Office of Apprenticeship
### 4:15 PM – 5:15 PM US PDT
Cloud Risk Management - Cloud Customer's Perspective
4:15 PM – 5:15 PM US PDT
Cloud Risk Management: The Cloud Customer's Perspective3rd Party Risk
Radhika Bajpai – PayPal Inc ### 1663859###Speaker###Senior Director###PayPal Inc###Speaker: – PayPal Inc
4:15 PM – 5:15 PM US PDT
Cybersecurity and risk in OT as convergence accelerates in a changing world
4:15 PM – 5:15 PM US PDT
Cybersecurity and Risk in OT as Convergence Accelerates in a Changing WorldICS/Critical Infrastructure
Michael L. Ferrell, CISSP – HCL ### 1663844###Speaker###Senior Cybersecurity Solutions Architect###HCL###Speaker: – HCL
4:15 PM – 5:15 PM US PDT
Key Success Factors When Outsourcing Incident Response
4:15 PM – 5:15 PM US PDT
Key Success Factors When Outsourcing Incident ResponseCo-Speaker: – Secureworks
Co-Speaker: – Secureworks
Incident Response/Investigations/Forensics/E-Discovery
John Hollenberger, CISSP, GCIH, GWAPT – Secureworks ### 1663815###Co-Speaker###Advisor, IT Security###Secureworks###Co-Speaker: – Secureworks
@@@ Robert Lelewski, CISSP, CISSP-ISSMP, CISA, CISM, CRISC, CFPSE, EnCE, CCE, CIPM, and GCIH – Secureworks ### 1663814###Co-Speaker###Director###Secureworks###Co-Speaker: – Secureworks
4:15 PM – 5:15 PM US PDT
Security Standards/ ISO2700: A tick-box exercise or an enabler to growth?
4:15 PM – 5:15 PM US PDT
Security Standards/ ISO 2700: A Tick-box Exercise or Enabler to Growth?Small/Medium-sized Business Security
Melanie Oldham, OBE – UKC3 & YCSC ### 1663839###Speaker###Vice Chair & Director###UKC3 & YCSC###Speaker: – UKC3 & YCSC
4:15 PM – 5:15 PM US PDT
The Security Journey: How to build a Business-aligned Risk Management Program
4:15 PM – 5:15 PM US PDT
The Security Journey: How to Build a Business-aligned Risk Management ProgramInformation Security Management
Jeff Foresman, CISSP, CEH – Optiv ### 1663850###Speaker###Vice President, Risk###Optiv###Speaker: – Optiv
4:15 PM – 5:15 PM US PDT
Why We Fail at Data Security (and How to do Better)
4:15 PM – 5:15 PM US PDT
Why We Fail at Data Security (and How to do Better)Speaker: – Kudelski Security
Data Protection
Zach Luze – Kudelski Security ### 1663801###Speaker###Senior Manager, Data Security Advisory###Kudelski Security###Speaker: – Kudelski Security
5:15 PM – 7:00 PM US PDT
Networking Event
5:15 PM – 7:00 PM US PDT
Networking Event
- Wednesday, October 12, 2022
8:00 AM – 9:00 AM US PDT
Keynote: Why Political Risk and Cybersecurity Collide in Times of Crisis
8:00 AM – 9:00 AM US PDT
Keynote: Why Political Risk and Cybersecurity Collide in Times of CrisisSpeaker: – New York Times best-selling author of “The Power of Crisis” and host of GZERO World
Ian Bremmer – New York Times best-selling author of “The Power of Crisis” and host of GZERO World ### 1718669###Speaker###President and Founder###New York Times best-selling author of “The Power of Crisis” and host of GZERO World###Speaker: – New York Times best-selling author of “The Power of Crisis” and host of GZERO World
### 9:05 AM – 10:05 AM US PDT
Keynote Presentation - To be Announced
9:05 AM – 10:05 AM US PDT
Keynote: Lessons in Leadership
Carey Lohrenz ### 1752427###Speaker###First Female F-14 Tomcat Fighter Pilot in the U.S. Navy######Speaker:
10:15 AM – 11:15 AM US PDT
Are You Ready for Scaled Quantum Computing? Anticipating Cryptographic Readiness Challenges for a Quantum Age
10:15 AM – 11:15 AM US PDT
Are You Ready for Scaled Quantum Computing? Anticipating Cryptographic Readiness Challenges for a Quantum AgeQuantum Computing
David Ott – VMware ### 1663836###Speaker###Senior Staff Researcher and Academic Program Director###VMware###Speaker: – VMware
10:15 AM – 11:15 AM US PDT
Cloud Risk and Governance - CCM v4 Hands-on
10:15 AM – 11:15 AM US PDT
Hands-on Cloud Risk and Governance: CCM v4Speaker: – Starbucks
Co-Speaker: – Raytheon Technologies
Cloud Security
Jon-Michael C. Brook, MBA, CISSP, CCSK – Starbucks ### 762384###Speaker###security architect principal###Starbucks###Speaker: – Starbucks
@@@ Randall S. Brooks, CISSP, CSSLP, ISSEP, ISSAP, ISSMP, CCSK – Raytheon Technologies ### 894384###Co-Speaker###Chief Engineer Cyber Operations and Development Center###Raytheon Technologies###Co-Speaker: – Raytheon Technologies
10:15 AM – 11:15 AM US PDT
Creating Lasting Security Change
10:15 AM – 11:15 AM US PDT
Creating Lasting Security ChangeCo-Speaker: – Amazon
Co-Speaker:
Human Factors
Sharon Smith, CISSP – Amazon ### 1062104###Co-Speaker###Sr. Risk Manager###Amazon###Co-Speaker: – Amazon
### @@@ Ngozi Pole ### 1663857###Co-Speaker###Sr. Manager Change Management######Co-Speaker:
### 10:15 AM – 11:15 AM US PDT
Payment Plans: A Checklist of Critical Considerations before Paying Ransomware Demands
10:15 AM – 11:15 AM US PDT
Payment Plans: A Checklist of Critical Considerations Before Paying Ransomware DemandsRansomware
Lance Hayden, PhD – Vericast ### 373737###Speaker###Chief Information Security Strategist###Vericast###Speaker: – Vericast
10:15 AM – 11:15 AM US PDT
Taking a threat-centric approach to building cyber resiliency
10:15 AM – 11:15 AM US PDT
Taking a Threat-centric Approach to Building Cyber ResiliencyThreats (Detection/Hunting/Intelligence/Mitigation/Monitoring)
Andrew Gorecki – IBM ### 1663821###Speaker###Global Remediation Lead###IBM###Speaker: – IBM
10:15 AM – 11:15 AM US PDT
The Day After: Managing Post-Incident Hardening & Resiliency
10:15 AM – 11:15 AM US PDT
The Day After: Managing Post-Incident Hardening and ResiliencyCo-Speaker: – Booz Allen Hamilton
Co-Speaker: – Booz Allen Hamilton
Incident Response/Investigations/Forensics/E-Discovery
Jacob Norwood – Booz Allen Hamilton ### 1663808###Co-Speaker###Director###Booz Allen Hamilton###Co-Speaker: – Booz Allen Hamilton
@@@ Tony Gaidhane – Booz Allen Hamilton ### 1663809###Co-Speaker###Vice President###Booz Allen Hamilton###Co-Speaker: – Booz Allen Hamilton
10:15 AM – 11:15 AM US PDT
The Next Big Attack: What to expect and how to protect
10:15 AM – 11:15 AM US PDT
The Next Big Attack: What to Expect and How to Protect3rd Party Risk
Erin Joe – Mandiant, Inc ### 1663862###Speaker###Senior Vice President, Strategy and Alliances###Mandiant, Inc###Speaker: – Mandiant, Inc
10:15 AM – 11:15 AM US PDT
The Tao of Vulnerability Management
10:15 AM – 11:15 AM US PDT
The Tao of Vulnerability ManagementSpeaker: – GDIT (General Dynamics Information Technology)
Network Security
Brian D. McKeon, MA, MBA, CISSP, PMP, ITIL – GDIT (General Dynamics Information Technology) ### 1398138###Speaker###Cyber Portfolio Manager###GDIT (General Dynamics Information Technology)###Speaker: – GDIT (General Dynamics Information Technology)
10:15 AM – 11:15 AM US PDT
Using the Marine Corps 70% rule to hire Cybersecurity talent quickly and efferently
10:15 AM – 11:15 AM US PDT
Using the Marine Corps 70% Rule to Hire Cybersecurity Talent Quickly and EfficientlyWorkforce Trends (Diversity/Recruiting)
Ron Sharon ### 1663825###Speaker###VP of Information Security######Speaker:
11:25 AM – 12:25 PM US PDT
Build Information Resilience into your Supply Chain and Save a Ton of Money
11:25 AM – 12:25 PM US PDT
Build Information Resilience into Your Supply Chain and Save a Ton of MoneyInformation Security Management
Willy Fabritius – SGS ### 1663861###Speaker###Global Head Strategy & Business Development Information Security Assurance###SGS###Speaker: – SGS
11:25 AM – 12:25 PM US PDT
CyberTheft of Trade Secrets, and Attorneys’ Ethical Considerations during Data Breaches
11:25 AM – 12:25 PM US PDT
Cyber Theft of Trade Secrets and Attorneys’ Ethical Considerations During Data BreachesSpeaker: – Yonovitz & Joe, L.L.P.
Cyber Crime
Herbert Joe – Yonovitz & Joe, L.L.P. ### 373667###Speaker###Managing Partner/Attorney/Cert. Forensic Consultant###Yonovitz & Joe, L.L.P.###Speaker: – Yonovitz & Joe, L.L.P.
11:25 AM – 12:25 PM US PDT
Elite Security Champions Build Strong Security Culture
11:25 AM – 12:25 PM US PDT
Elite Security Champions Build Strong Security CultureSpeaker: – Security Journey
Application Security/ Software Assurance
Christopher Romeo, CISSP, CSSLP – Security Journey ### 373691###Speaker###CEO###Security Journey###Speaker: – Security Journey
11:25 AM – 12:25 PM US PDT
Emerging threats against cloud application identities and what you should do about it
11:25 AM – 12:25 PM US PDT
Emerging Threats Against Cloud Application Identities (And What You Should Do About It)Co-Speaker: – Microsoft
Co-Speaker: – Microsoft
Identity/Authentication/Access Management
Etan Basseri, CISSP – Microsoft ### 1663806###Co-Speaker###Senior Product Manager###Microsoft###Co-Speaker: – Microsoft
### @@@ Bailey Bercik – Microsoft ### 1663807###Co-Speaker###Product Manager II###Microsoft###Co-Speaker: – Microsoft
### 11:25 AM – 12:25 PM US PDT
My Baby Done Bad Crypto, My Sweet Baby Done Me Wrong
11:25 AM – 12:25 PM US PDT
My Baby Done Bad Crypto, My Sweet Baby Done Me WrongData Protection
Dan Houser, CISSP-ISSAP-ISSMP CSSLP CCSP – Avanade ### 1663856###Speaker###Group Manager###Avanade###Speaker: – Avanade
### 11:25 AM – 12:25 PM US PDT
Neurodiversity Recruitment and Retention in Entry and Midcareer Cybersecurity
11:25 AM – 12:25 PM US PDT
Neurodiversity Recruitment and Retention in Entry and Midcareer CybersecuritySpeaker: – CREIGHTON UNIVERSITY
Workforce Trends (Diversity/Recruiting)
John Rosario Curtin – CREIGHTON UNIVERSITY ### 1663822###Speaker###Special Instructor, Cybersecurity###CREIGHTON UNIVERSITY###Speaker: – CREIGHTON UNIVERSITY
11:25 AM – 12:25 PM US PDT
Search Warrants, Subpoenas, and Court Orders: What You Need to Know
11:25 AM – 12:25 PM US PDT
Search Warrants, Subpoenas and Court Orders: What You Need to KnowCo-Speaker: – Spirion, LLC
Co-Speaker: – Bandler Law Firm PLLC
Co-Speaker: – EY
Co-Speaker: – Global Cyber Risk LLC
Governance, Regulation and Compliance
Scott M. Giordano, CISSP, CCSP – Spirion, LLC ### 1062095###Co-Speaker###V.P., Corporate Privacy, and General Counsel###Spirion, LLC###Co-Speaker: – Spirion, LLC
@@@ John Bandler, Esq., CISSP – Bandler Law Firm PLLC ### 383616###Co-Speaker###Founder and Principal###Bandler Law Firm PLLC###Co-Speaker: – Bandler Law Firm PLLC
@@@ John Bates, JD, CIPP/US, CIPP/E – EY ### 1398130###Co-Speaker###Manager, Cybersecurity###EY###Co-Speaker: – EY
@@@ Jody R. Westby, JD – Global Cyber Risk LLC ### 1398170###Co-Speaker###CEO###Global Cyber Risk LLC###Co-Speaker: – Global Cyber Risk LLC
11:25 AM – 12:25 PM US PDT
Securing Industrial Control System Criticality of ICS, Threats , Vulnerabilities, Mitigation of Risk
11:25 AM – 12:25 PM US PDT
Securing Industrial Control Systems: The Criticality of Threats, Vulnerabilities and Risk MitigationsSpeaker: – AKS IT Services
ICS/Critical Infrastructure
Ashish K. Saxena, CISSP, CISA – AKS IT Services ### 1663803###Speaker###Managing Director###AKS IT Services###Speaker: – AKS IT Services
11:25 AM – 12:25 PM US PDT
Security Architecture - The Benefits & Framework
11:25 AM – 12:25 PM US PDT
Security Architecture: The Benefits and FrameworkSecurity Architecture/Engineering
Tom Madsen – NNIT ### 1663826###Speaker###Security Architect###NNIT###Speaker: – NNIT