- Monday, October 10, 2022
8:00 AM – 9:30 AM US PDT
Keynote Presentation - To be Announced
8:00 AM – 9:30 AM US PDT
The Power of CommunityCo-Speaker: – (ISC)²
Co-Speaker: – U.S. Department of Energy
Co-Speaker: – SCYTHE
Co-Speaker: – Women's Society of Cyberjutsu
Co-Speaker: – DataRobot
Clar Rosso – (ISC)² ### 1402015###Co-Speaker###CEO###(ISC)²###Co-Speaker: – (ISC)²
### @@@ Ann Dunkin – U.S. Department of Energy ### 1807128###Co-Speaker###Chief Information Officer###U.S. Department of Energy###Co-Speaker: – U.S. Department of Energy
### @@@ Bryson Bort – SCYTHE ### 1807129###Co-Speaker###Founder & CEO###SCYTHE###Co-Speaker: – SCYTHE
### @@@ Mari Galloway, BBACIS MSIS CISSP GIACx6 Pentest+ CySA+ Security+ IT Project+ CEH – Women's Society of Cyberjutsu ### 1062109###Co-Speaker###CEO; Sr Security Architect###Women's Society of Cyberjutsu###Co-Speaker: – Women's Society of Cyberjutsu
### @@@ Andrew Smeaton – DataRobot ### 1807132###Co-Speaker###Chief Information Security Officer###DataRobot###Co-Speaker: – DataRobot
### 9:30 AM – 10:00 AM US PDT
Exhibit Hall Opening & Break
9:30 AM – 10:00 AM US PDT
Exhibit Hall Opening & Break
10:00 AM – 10:50 AM US PDT
Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft Skills
10:00 AM – 10:50 AM US PDT
Career Center Series: Community Involvement as a Pathway to Develop Leadership and Soft SkillsSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
10:00 AM – 10:55 AM US PDT
Are Deepfakes Really a Security Threat?
10:00 AM – 10:55 AM US PDT
Are Deepfakes Really a Security Threat?Speaker: – Carnegie Mellon University
Security Automation/Artificial Intelligence/Machine Learning
Thomas P. Scanlon, CISSP – Carnegie Mellon University ### 373819###Speaker###Technical Manager - CERT Data Science###Carnegie Mellon University###Speaker: – Carnegie Mellon University
10:00 AM – 10:55 AM US PDT
Digital Governance: A Fireside Chat with IAPP and (ISC)²
10:00 AM – 10:55 AM US PDT
Digital Governance: A Fireside Chat with IAPP and (ISC)²Co-Speaker: – IAPP
Co-Speaker: – (ISC)²
Trevor Hughes – IAPP ### 1806597###Co-Speaker###CEO###IAPP###Co-Speaker: – IAPP
### @@@ Clar Rosso – (ISC)² ### 1402015###Co-Speaker###CEO###(ISC)²###Co-Speaker: – (ISC)²
### 10:00 AM – 10:55 AM US PDT
Effective Cybersecurity Board Reporting
10:00 AM – 10:55 AM US PDT
Effective Cybersecurity Board ReportingInformation Security Management
Kurt Manske – Kurt Manske ### 1663843###Speaker###Managing Principal###Kurt Manske###Speaker: – Kurt Manske
10:00 AM – 10:55 AM US PDT
Ethics Confidential: Inside the Inner-workings of the Ethics Committee
10:00 AM – 10:55 AM US PDT
Now More Than Ever: Ethics in CyberCo-Speaker: – Avanade
Co-Speaker: – (ISC)²
Professional & Career Development
Dan Houser, CISSP-ISSAP-ISSMP CSSLP CCSP – Avanade ### 1663856###Co-Speaker###Group Manager###Avanade###Co-Speaker: – Avanade
### @@@ Casey Marks – (ISC)² ### 1461405###Co-Speaker###Chief Qualifications Office###(ISC)²###Co-Speaker: – (ISC)²
### 10:00 AM – 10:55 AM US PDT
Fortify Your Cloud Security - Sponsored by Sysdig
10:00 AM – 10:55 AM US PDT
Fortify Your Cloud Security - Sponsored by Sysdig
Brett Wolmarans – Sysdig ### 1794165###Speaker###Technical Marketing Manager###Sysdig###Speaker: – Sysdig
### 10:00 AM – 10:55 AM US PDT
How to Proof of Concept (PoC) Cybersecurity tools
10:00 AM – 10:55 AM US PDT
How to Proof of Concept (PoC) Cybersecurity ToolsSecurity Architecture/Engineering
Alex Haynes, CISSP – IBS Software ### 1062088###Speaker###CISO###IBS Software###Speaker: – IBS Software
10:00 AM – 10:55 AM US PDT
Incident Response Ready - Key Steps of a Ransomware Incident Response Plan
10:00 AM – 10:55 AM US PDT
Incident Response Ready—Key Steps of a Ransomware Incident Response PlanIncident Response/Investigations/Forensics/E-Discovery
Joseph Carson, CISSP – Delinea ### 769663###Speaker###Chief Security Scientist & Advisory CISO###Delinea###Speaker: – Delinea
10:00 AM – 10:55 AM US PDT
OWASP Top 10 Risks
10:00 AM – 10:55 AM US PDT
Vandana Verma Sehgal – Snyk ### 1810483###Speaker###Security Leader###Snyk###Speaker: – Snyk
### 10:00 AM – 10:55 AM US PDT
Trust No One: Practical Zero-Trust for Cloud
10:00 AM – 10:55 AM US PDT
Trust No One: Practical Zero Trust for CloudSpeaker: – Amazon Web Services
Co-Speaker: – McKinsey & Company
Cloud Security
Joshua E. Bregler, CISSP, CCSP – Amazon Web Services ### 675287###Speaker###Security Architect, Department of Defense###Amazon Web Services###Speaker: – Amazon Web Services
@@@ Jeffrey Caso – McKinsey & Company ### 1762165###Co-Speaker###Associate Partner and Cyber Expert###McKinsey & Company###Co-Speaker: – McKinsey & Company
10:35 AM – 11:35 AM US PDT
Is Your Cloud Data Lurking in the Shadows?
10:35 AM – 11:35 AM US PDT
Is Your Cloud Data Lurking in the Shadows?Speaker: – Laminar Security
Andy Smith – Laminar Security ### 1795456###Speaker######Laminar Security###Speaker: – Laminar Security
### 11:05 AM – 12:00 PM US PDT
13 Keys to Unlock Mentoring Cybersecurity Interns
11:05 AM – 12:00 PM US PDT
13 Keys to Unlock Mentoring Cybersecurity InternsWorkforce Trends (Diversity/Recruiting)
Raymond Pompon, CISSP – Convera ### 1398142###Speaker###Director of Cybersecurity Programs###Convera###Speaker: – Convera
11:05 AM – 12:00 PM US PDT
A handful of needles in a million attack haystack: attack tree analysis of an ICS
11:05 AM – 12:00 PM US PDT
A Handful of Needles in a Million-Attack Haystack: Attack Tree Analysis of an ICSSpeaker: – Amenaza Technologies Limited
ICS/Critical Infrastructure
Terrance R. Ingoldsby, CISSP – Amenaza Technologies Limited ### 1398127###Speaker###President###Amenaza Technologies Limited###Speaker: – Amenaza Technologies Limited
11:05 AM – 12:00 PM US PDT
Dead Man's Hand: Mobile Application Threat Modeling
11:05 AM – 12:00 PM US PDT
Dead Man's Hand: Mobile Application Threat ModelingMobile Security
Richard Tychansky – N/A ### 373775###Speaker###Cloud Security Architect###N/A###Speaker: – N/A
11:05 AM – 12:00 PM US PDT
Impacting and actionable dashboards to monitor your security posture and engage with senior management
11:05 AM – 12:00 PM US PDT
Impactful, Actionable Dashboards to Monitor Your Security Posture and Improve Executive Engagement Governance, Regulation and Compliance
Florence-Stéphanie Bertaut – AXA France ### 1663832###Speaker###Deputy CSO###AXA France###Speaker: – AXA France
11:05 AM – 12:00 PM US PDT
Self-Protecting Data: An Artificial Intelligence Use Case
11:05 AM – 12:00 PM US PDT
Self-Protecting Data: An Artificial Intelligence Use CaseSpeaker: – Headquarters Cyberspace Capabilities Center (USAF)
Data Protection
Joseph DiGiovanni – Headquarters Cyberspace Capabilities Center (USAF) ### 1398174###Speaker###Branch Chief, Security Engineering###Headquarters Cyberspace Capabilities Center (USAF)###Speaker: – Headquarters Cyberspace Capabilities Center (USAF)
11:05 AM – 12:00 PM US PDT
So, you’re a new security leader, what now? … Build, Implement, and measure your success.
11:05 AM – 12:00 PM US PDT
So, You’re a New Security Leader. What now? Information Security Management
Cameron Fischer, CISSP CISM CRISC CEH GSTRT – Capital Power ### 1663820###Speaker###Director, Cyber Security & Architecture###Capital Power###Speaker: – Capital Power
11:05 AM – 12:00 PM US PDT
The Fourth Industrial Revolutions Impact on Cybersecurity Programs
11:05 AM – 12:00 PM US PDT
The Fourth Industrial Revolutions Impact on Cybersecurity ProgramsHuman Factors
James R. McQuiggan – KnowBe4 ### 762407###Speaker###Security Awareness Advocate###KnowBe4###Speaker: – KnowBe4
11:05 AM – 12:00 PM US PDT
The Intersection of Fraud Prevention and Cybersecurity
11:05 AM – 12:00 PM US PDT
The Intersection of Fraud Prevention and CybersecuritySpeaker: – Virtual CSO, LLC
Cyber Crime
Gideon T. Rasmussen – Virtual CSO, LLC ### 674941###Speaker###vCISO, Consulting Principal###Virtual CSO, LLC###Speaker: – Virtual CSO, LLC
### 11:05 AM – 12:00 PM US PDT
Women's Career Path in Digital Trust Industry 2022
11:05 AM – 12:00 PM US PDT
Women's Career Path in the Digital Trust Industry 2022Speaker: – PwC ConsultingLLC
Information Security Careers
Hiromi Aiko, CISSP, CISA, ISMS – PwC ConsultingLLC ### 1663827###Speaker###Researcher/ Senior Associate###PwC ConsultingLLC###Speaker: – PwC ConsultingLLC
12:00 PM – 12:50 PM US PDT
Lunch
12:00 PM – 12:50 PM US PDT
Lunch
12:50 PM – 2:20 PM US PDT
Town Hall
12:50 PM – 2:20 PM US PDT
Town HallModerator: – (ISC)²
Panelist: – Pacific Northwest National Laboratory
Panelist: – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization
Panelist: – (ISC)²
Clar Rosso – (ISC)² ### 1402015###Moderator###CEO###(ISC)²###Moderator: – (ISC)²
@@@ Lori Ross O'Neil, CISSP, PMP – Pacific Northwest National Laboratory ### 1398158###Panelist###Sr Cyber Security Researcher###Pacific Northwest National Laboratory###Panelist: – Pacific Northwest National Laboratory
@@@ Zachary Tudor, CISSP – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization ### 1461406###Panelist###Associate Laboratory Director###Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization###Panelist: – Idaho National Laboratory’s (INL) National and Homeland Security’s (N&HS) organization
@@@ Jon France, CISSP – (ISC)² ### 1757710###Panelist###Chief Information Security Officer###(ISC)²###Panelist: – (ISC)²
1:00 PM – 1:50 PM US PDT
Career Center Series: 10 Things Every Job Seeker Should Know
1:00 PM – 1:50 PM US PDT
Career Center Series: 10 Things Every Job Seeker Should KnowSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
2:00 PM – 2:50 PM US PDT
Career Center Series: Military Transition Success
2:00 PM – 2:50 PM US PDT
Career Center Series: Military Transition SuccessSpeaker: – ClearedJobs.net
Professional & Career Development
Kathleen Smith – ClearedJobs.net ### 361716###Speaker###CMO###ClearedJobs.net###Speaker: – ClearedJobs.net
### 2:30 PM – 3:30 PM US PDT
An Insider View of CISA's ICT Supply Chain Risk Management (SCRM) Task Force
2:30 PM – 3:30 PM US PDT
An Insider View of CISA's ICT Supply Chain Risk Management Task ForceSupply Chain Security
Chad Kliewer, MS, CISSP, CCSP – (ISC)² ### 1398171###Speaker###Education CPE Evaluator Lead###(ISC)²###Speaker: – (ISC)²
2:30 PM – 3:30 PM US PDT
Creating a Behavioral Cybersecurity Program
2:30 PM – 3:30 PM US PDT
Creating a Behavioral Cybersecurity ProgramHuman Factors
Ira Winkler, CISSP – Walmart ### 361691###Speaker###Chief Security Architect###Walmart###Speaker: – Walmart
2:30 PM – 3:30 PM US PDT
'Fail to Plan = Plan to Fail' - Preparing For Your Cybersecurity Incident Response
2:30 PM – 3:30 PM US PDT
'Fail to Plan = Plan to Fail': Preparing for Your Cybersecurity Incident ResponseIncident Response/Investigations/Forensics/E-Discovery
Alice Fakir – IBM ### 1779469###Speaker###Account Partner, Federal Security Services North America###IBM###Speaker: – IBM
### 2:30 PM – 3:30 PM US PDT
No More Sodinokibi - A Hybrid Software Application for Detecting the REvil/Sodinokibi Ransomware
2:30 PM – 3:30 PM US PDT
No More Sodinokibi —A Hybrid Software Application for Detecting the REvil/Sodinokibi RansomwareRansomware
Mauricio Bezerra, CISSP – AWS ### 1663810###Speaker###Senior Consultant###AWS###Speaker: – AWS
2:30 PM – 3:30 PM US PDT
Rejuvenating or Reforming Your Chapter
2:30 PM – 3:30 PM US PDT
Rejuvenating or Reforming Your ChapterSpeaker: – ISC2 NJ Chapter
Professional & Career Development
Ken Fishkin, CISSP, CCSP, CIPP/US, CIPM, CIPT – ISC2 NJ Chapter ### 532529###Speaker###President###ISC2 NJ Chapter###Speaker: – ISC2 NJ Chapter
2:30 PM – 3:30 PM US PDT
Security metrics - how to measure it efficiently
2:30 PM – 3:30 PM US PDT
Security Metrics —How to Measure Them EfficientlySpeaker: – Locked Jar PTE. LTD.
Information Security Management
Ilia Tivin – Locked Jar PTE. LTD. ### 1663800###Speaker###Founder###Locked Jar PTE. LTD.###Speaker: – Locked Jar PTE. LTD.
2:30 PM – 3:30 PM US PDT
So you want to be an expert witness
2:30 PM – 3:30 PM US PDT
So You Want to be an Expert WitnessProfessional & Career Development
Hoyt L. Kesterson, II, QSA, CISSP, CISA – Avertium ### 1398200###Speaker###Senior Security & Risk Architect###Avertium###Speaker: – Avertium
### 2:30 PM – 3:30 PM US PDT
Top public cloud security fails and how to avoid them
2:30 PM – 3:30 PM US PDT
Top Public Cloud Security Fails and How to Avoid ThemCloud Security
Karl Ots, CISSP – EPAM Systems ### 1398140###Speaker###Head of Cloud Security###EPAM Systems###Speaker: – EPAM Systems
2:30 PM – 3:30 PM US PDT
Zero Trust Is The Only Security Strategy
2:30 PM – 3:30 PM US PDT
Zero Trust Is the Only Security StrategyZero Trust
George Finney – SMU ### 1663823###Speaker###Chief Security Officer###SMU###Speaker: – SMU
### 3:00 PM – 3:50 PM US PDT
Career Center Series: Virtual Job Fair Success
3:00 PM – 3:50 PM US PDT
Career Center Series: Virtual Job Fair SuccessSpeaker: – ClearedJobs.net
Professional & Career Development
Courtney Schwarten – ClearedJobs.net ### 1759973###Speaker###Career Coach###ClearedJobs.net###Speaker: – ClearedJobs.net
3:30 PM – 4:00 PM US PDT
Exhibit Hall Break
3:30 PM – 4:00 PM US PDT
Exhibit Hall & Break
3:50 PM – 4:10 PM US PDT
Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
3:50 PM – 4:10 PM US PDT
Education Theater Presentation - How AI Can Think Like an Attacker - sponsored by Darktrace
Bryce Fountaine ### 1807090###Speaker#########Speaker:
### 4:00 PM – 5:00 PM US PDT
Against All Odds: Cloud SaaS Attack Surface Management
4:00 PM – 5:00 PM US PDT
Against All Odds: Cloud SaaS Attack Surface ManagementAttack Surface Management
Richard Tychansky – N/A ### 373775###Speaker###Cloud Security Architect###N/A###Speaker: – N/A
4:00 PM – 5:00 PM US PDT
All About That Data: How Data Security and Management Will Rule The World
4:00 PM – 5:00 PM US PDT
All About That Data: How Data Security and Management Will Rule The WorldData Protection
Andrew Neal, MSc, CCFP, C|CISO,CISM,CRISC – Gartner ### 373785###Speaker###VP Research###Gartner###Speaker: – Gartner
4:00 PM – 5:00 PM US PDT
Best Practices for Managing & Preventing Insider Threats from Interviewing Experts
4:00 PM – 5:00 PM US PDT
Best Practices for Managing and Preventing Insider Threats from Interviewing ExpertsSpeaker: – Dennehy Services
Insider Threat(s)
Michael J. Dennehy, CISSP, CCSP, CISM, PMP, CISA – Dennehy Services ### 1663818###Speaker###Cybersecurity Architect Director###Dennehy Services###Speaker: – Dennehy Services
4:00 PM – 5:00 PM US PDT
Cyber Risk Metrics & Reporting
4:00 PM – 5:00 PM US PDT
Cyber Risk Metrics and ReportingInformation Security Management
Priya Mouli, MBA, CDPSE, CISSP – PwC ### 1663799###Speaker###Director, Cybersecurity and Privacy###PwC###Speaker: – PwC
4:00 PM – 5:00 PM US PDT
How to Create Effective and Engaging Cybersecurity Training for Employees
4:00 PM – 5:00 PM US PDT
How to Create Effective and Engaging Cybersecurity Training for EmployeesWorkforce Trends (Diversity/Recruiting)
Matthew J. McMahon – Philips ### 1663829###Speaker###Sr Product Manager of Cybersecurity###Philips###Speaker: – Philips
4:00 PM – 5:00 PM US PDT
Introduction to Threat Hunting
4:00 PM – 5:00 PM US PDT
Introduction to Threat HuntingThreats (Detection/Hunting/Intelligence/Mitigation/Monitoring)
Rahul Anand – HAMBS ### 1663849###Speaker###Cyber Security Manager###HAMBS###Speaker: – HAMBS
4:00 PM – 5:00 PM US PDT
Plugging the gaps in cybersecurity with a Shift Left strategy
4:00 PM – 5:00 PM US PDT
Plugging the Gaps in Cybersecurity with a Shift Left StrategyDevSecOps
Parul Khanna, MS CISSP CCSP CISM CRISC CDPSE CCSK – Manulife ### 1398201###Speaker###Senior Consultant###Manulife###Speaker: – Manulife
4:00 PM – 5:00 PM US PDT
Three Simple and Effective Cybersecurity Exercises
4:00 PM – 5:00 PM US PDT
Three Simple and Effective Cybersecurity ExercisesCo-Speaker: – Secureworks
Co-Speaker: – Secureworks
Information Security Management
Robert Lelewski, CISSP, CISSP-ISSMP, CISA, CISM, CRISC, CFPSE, EnCE, CCE, CIPM, and GCIH – Secureworks ### 1663814###Co-Speaker###Director###Secureworks###Co-Speaker: – Secureworks
@@@ John Hollenberger, CISSP, GCIH, GWAPT – Secureworks ### 1663815###Co-Speaker###Advisor, IT Security###Secureworks###Co-Speaker: – Secureworks
4:00 PM – 5:00 PM US PDT
Vulnerability Management is Dead! Long Live Vulnerability Management!
4:00 PM – 5:00 PM US PDT
Vulnerability Management is Dead! Long Live Vulnerability Management!Speaker: – Allstate Insurance Company
Co-Speaker: – University Of Maryland Global Campus
Network Security
Ethan Wilder, M.S, CISSP – Allstate Insurance Company ### 1663830###Speaker###Sr Manager Product Security###Allstate Insurance Company###Speaker: – Allstate Insurance Company
@@@ Sudesh Kannan, PhD, CISSP, CISM, CIPP(US) – University Of Maryland Global Campus ### 1663831###Co-Speaker###Adjunct Professor###University Of Maryland Global Campus###Co-Speaker: – University Of Maryland Global Campus
6:00 PM – 8:30 PM US PDT
Networking Extravaganza
6:00 PM – 8:30 PM US PDT
Networking Extravaganza