7:30 AM - 8:30 AM Registration and Continental Breakfast
8:30 AM - 9:30 AM
 Welcome Keynote: Radical Remodeling: Renovating Security for Today's Problems and Tomorrow's Opportunities, presented by Rich Mogull

9:30 AM - 9:45 AM Tech Spotlight Session presented by HP
9:45 AM - 10:00 AM Refreshment Break
10:00 AM - 11:00 AM Concurrent Sessions
      A1 Ninja Looting Like A Pirate
      B1 Data Protection - How to Sleep Better at Night
      C1 Management Hacking 101: Leading High Performance Security Teams
      D1 Launch, Detect, Evolve: The Mutation of Malware
      E1 Watch Out! Yet Another Regulator is Asking Questions!
      F1 Incident Response: The First 48
      G1 Protecting Dollars for Pennies: Improving organizational security with effective, inexpensive solutions (90 min)

11:00 AM - 11:50 AM Concurrent Sessions
      A2 Pentesting Yourself to DEBT
      B2 Do You Have a Mega Breach Brewing?
      C2 Late-breaking session
      D2 Applying Analytics to Cyber Threat Intelligence
      E2 Insider Risk: Attacking the Threat From Within
      F2 Behavioral Analysis Using DNS, Network Traffic, and Logs
12:00 PM - 1:15 PM Networking Lunch
1:15 PM - 2:05 PM Concurrent Sessions
      A3 Everything is Code: Why should you worry about software security and coding standards?
      B3 Late-breaking session
      C3 It's Not If But When: How to Create Your Cyber Incident Response Plan
      D3 Developing a Threat and Vulnerability Management Program: A Pentester's Perspective
      E3 Vendor Vetting: Who's touching your stuff?
      F3 Application Security: From the Ground Up
      G2 Risk v Threat: Threat Intelligence Exposed (90 min)
2:15 PM - 3:05 PM Concurrent Sessions
      A4 Scouting AWS Accounts for Security Gaps
      B4 Secure Development for the Cloud
      C4 I Have Phish I's For You
      D4 Forensics and Discovery Obligations vs. International Privacy Law
      E4 Self-Audits: Applying User Context to Activity Anomalies
      F4 Late-breaking session
3:05 PM - 3:30 PM Refreshment Break
3:30 PM - 4:20 PM Concurrent Sessions
      A5 The Exploits Used in Ransomware Campaigns
      B5 Secure Data Logistics: How Information Security Can Learn from Armored Cars
      C5 Cutting Through the Security Analytics Hype
      D5 Late-breaking session
      E5 An Aflac Case Study: Moving a security program from defense to offense
      F5 Rise of Cyber Hunting: Not Falling Victim To Undetected Breaches
      G3 Securing Innovation (75 min)
4:30 PM - 5:00 PM Panel Discussion: Cyber Liability Insurance: Misinformation Everywhere!
5:00 PM - 6:00 PM Welcome Reception in the Expo


7:30 AM - 8:15 AM Breakfast Power Session 
7:30 AM - 8:30 AM Continental Breakfast
8:30 AM - 9:30 AM Keynote Address: Rebooting the Auto Industry: When Security Affects Safety, presented by Craig Smith
9:40 AM - 10:30 AM Concurrent Sessions
      A6 Everything I Know About Security I Learned From Watching Kung Fu Movies
      B6/B7 Your Data was Breached, Now What? An Interactive Incident Response Tabletop Experience
      C6 Becoming Bi-lingual: Community Cybersecurity as a Business Impact
      D6 Corporate Cannabis: Lessons Learned in Modeling a Controversial Threat Profile
      E6 Late-breaking session
      F6 Mutiny on the Bounty: Handling security in a bug bounty world
      G4 IoT Security and its Impact on Your Job (90 min)
10:40 AM - 11:30 AM Concurrent Sessions
      A7 Excuse me, Server, do you have the time?
      B6/B7 Your Data was Breached, Now What? An Interactive Incident Response Tabletop Experience
      C7 Late-breaking session
      D7 The Details of Forensic Case Studies
      E7 Creating a Relevant Cyber Security Governance Framework: Supporting Business Digital Transformation
      F7 Getting Off the Back Foot – Employing Active Defense
      G4 IoT Security and its Impact on Your Job
11:30 AM Expo Opens
12:00 PM Lunch on the Expo Floor
1:30 PM - 2:30 PM Keynote Address: 1998 Called and It Wants Its Stupid Internet Law Back...Before It Destroys the World, presented by Cory Doctorow
2:30 PM - 3:00 PM Refreshment Break with Exhibitors
3:00 PM - 3:50 PM Concurrent Sessions
      A8 Late-breaking session
      B8 Pi in the Sky: The push towards cloud-based applications
      C8 Fast, Cheap or Good? How a Fortune 500 picked all three in assessing enterprise to cloud application migration risks
      D8 Threat Modeling Wearables By 2019
      E8 Moving Mountains through Measurement
      F8 Victory in 100 Battles: How to Perform a Successful Asset Inventory
      G5 The Technology is Worth 5% (90 min)

4:00 PM - 4:50 PM Concurrent Sessions
      A9 Abnormal Behavior Detection in Large Environments
      B9 Late-breaking session
      C9 Information Security Assessments: Building bridges instead of making enemies
      D9 Facing Emerging Threats - Evolving from Penetration Testing to Capability Effectiveness Testing
      E9 Case Study: Atlassian’s Journey Through CSA Certification
      F9 The Phishing Kill Chain
      G5 The Technology is Worth 5%

4:50 PM - 6:15 PM Networking Reception with Exhibitors


8:00 AM - 8:30 AM Continental Breakfast in the Expo
8:30 AM - 9:30 AM Keynote Address: The Three T’s of Security: Talent, Tools & Techniques, presented by Jim Routh
9:30 AM - 11:00 AM Refreshment Break in the Expo
10:30 AM - 11:20 AM Concurrent Sessions
      A10 Hacking Blockchain
      B10 Patients Have Lost Patience for Data Breaches
      C10 What We Learn from Hackers ... and the Government
      D10 Social Engineering: It's Not Just for Suckers Anymore
      E10 Cyber Liability Insurance 101 - What you should know before and after a breach
      F10 Dealing with Cyberextortion, Ransomware, and Other Bad Stuff
      G6 Is Enterprise Resiliency the New Security Strategy (75 min)

11:30 AM - 12:15 PM Closing Plenary Panel:You’re in a Leadership Position, Now What? 

    Event Sponsor
 HP 200x110

      Platinum Sponsors

   accelerite 200x110

 Lieberman 200x110

Malwarebytes 200x110 






      Gold Sponsors

Anomali 200x110

CheckPoint 200x110

Cylance 200x110