top of page
Breakout Room D - Hardware Hacking all day
Lock picking on field all day
Session | Auditorium Stage | Field Stage |
---|---|---|
7:30 | Registration and Breakfast | |
8:20 | Introductions | |
8:30 | Island - How the Enterprise Browser is improving security, transparency, and trust in today’s workplace. | |
9:15 | 15 Minute Networking | |
9:30 | Ontinue - An Untold Truth: 5 Key Things You Need to Know About Threat Response | Sevco - How can you protect what you don’t see? |
10:00 | 5 Minute Break | |
10:05 | Exabeam - The Science of Normal: Paradigm Shift to Cybersecurity Operations | Team Cymru - Deriving Insight from Threat Actor Infrastructure |
10:35 | 10 Minute Networking | |
10:45 | Seemplicity - Everyone’s Talking About Hyperautomation: Scaling Remediation | Rubrik - Delivering Operational Resilience in the Age of Ransomware |
11:15 | 5 Minute Networking | |
11:20 | Securiti - Unified Controls for the Big-Bang Era of Cloud Data | Forcepoint - Insider Threat Program Managers; Your WAZE to Success |
11:55 | 5 Minute Break | |
12:00 | Ira Winkler - How to Get the Security Budget you Need | |
12:25 | 10 Minutes Grab Lunch | |
12:35 | Lunch Keynote - CyberOne | |
1:15 | 10 Minute Break | |
1:25 | Randori - Embedding the Attacker's Perspective - An Inside Look Into How Hackers Prioritize Targets at Scale | SpyCloud - Identity-Centric Security & the SOCs to Match: Improve Malware Response for Better Ransomware Prevention |
1:55 | 5 Minute Break | |
2:00 | Palo Alto Networks - Cloud Migration's Dangerous Pothole: Application Development Security | VMRay - Overwhelmed By Malware and Phishing Alerts? Struggling to Identify Unknown Malware? Here’s How to Speed Up Investigation and Response |
2:30 | 15 Minute Networking and Snacks | |
2:45 | NetSPI - Application Security in Depth: A Layered Approach to AppSec | Kudelski - Why You Aren’t Making As Much Progress to What’s Holding You Back |
3:15 | 5 Minute Break | |
3:20 | Picus Security - Getting Ahead of a Breach | Halcyon - The Business of Ransomware |
3:50 | 15 Minute Networking | |
4:05 | Secureworks - Retaining Talent and Enhancing Threat Hunting Strategies in the Age of Expanding Attack Surfaces | Panther - Mission SIEMpossible - From Legacy SIEM to Detection-as-Code |
4:35 | Closing Comments and Prizes | |
5:00-6:00 | Happy Hour and DJ |
Main Agenda
8:20-8:30
Field Stage: Introductions
10:05-10:35
1020 Sessions
10:45-11:15
1100 Sessions
11:20-11:55
Auditorium: Live recording of the Cyber Ranch Podcast - Unified Controls for the Big-Bang Era of Cloud Data
1140 Sessions
1215 Session
12:00-12:25
Grab Lunch
CyberOne Session
12:35-1:15
1:25-1:55
Auditorium: Embedding the Attacker's Perspective - An Inside Look Into How Hackers Prioritize Targets at Scale
125 Sessions
2:00-2:30
200 Sessions
2:45-3:15
245 Sessions
3:20-3:50
320 Sessions
4:05-4:35
405 Sessions
4:35-6:00
Happy Hour
Field Stage: Closing comments and prizes
bottom of page