top of page
Breakout Room D - Hardware Hacking all day
Lock picking on field all day
Session
Auditorium Stage
Field Stage
7:30
Registration and Breakfast
8:20
Introductions
8:30
Island - How the Enterprise Browser is improving security, transparency, and trust in today’s workplace.
9:15
15 Minute Networking
9:30
Ontinue - An Untold Truth: 5 Key Things You Need to Know About Threat Response
Sevco - How can you protect what you don’t see?
10:00
5 Minute Break
10:05
Exabeam - The Science of Normal: Paradigm Shift to Cybersecurity Operations
Team Cymru - Deriving Insight from Threat Actor Infrastructure
10:35
10 Minute Networking
10:45
Seemplicity - Everyone’s Talking About Hyperautomation: Scaling Remediation
Rubrik - Delivering Operational Resilience in the Age of Ransomware
11:15
5 Minute Networking
11:20
Securiti - Unified Controls for the Big-Bang Era of Cloud Data
Forcepoint - Insider Threat Program Managers; Your WAZE to Success
11:55
5 Minute Break
12:00
Ira Winkler - How to Get the Security Budget you Need
12:25
10 Minutes Grab Lunch
12:35
Lunch Keynote - CyberOne
1:15
10 Minute Break
1:25
Randori - Embedding the Attacker's Perspective - An Inside Look Into How Hackers Prioritize Targets at Scale
SpyCloud - Identity-Centric Security & the SOCs to Match: Improve Malware Response for Better Ransomware Prevention
1:55
5 Minute Break
2:00
Palo Alto Networks - Cloud Migration's Dangerous Pothole: Application Development Security
VMRay - Overwhelmed By Malware and Phishing Alerts? Struggling to Identify Unknown Malware? Here’s How to Speed Up Investigation and Response
2:30
15 Minute Networking and Snacks
2:45
NetSPI - Application Security in Depth: A Layered Approach to AppSec
Kudelski - Why You Aren’t Making As Much Progress to What’s Holding You Back
3:15
5 Minute Break
3:20
Picus Security - Getting Ahead of a Breach
Halcyon - The Business of Ransomware
3:50
15 Minute Networking
4:05
Secureworks - Retaining Talent and Enhancing Threat Hunting Strategies in the Age of Expanding Attack Surfaces
Panther - Mission SIEMpossible - From Legacy SIEM to Detection-as-Code
4:35
Closing Comments and Prizes
5:00-6:00
Happy Hour and DJ
Main Agenda

8:20-8:30

Field Stage: Introductions

Island Schedule

8:30-9:15

Logo_Horizontal_for White BG.png

9:30-10:00

945 Sessions

10:05-10:35

1020 Sessions

10:45-11:15

1100 Sessions

11:20-11:55

1140 Sessions
1215 Session

12:00-12:25

Grab Lunch

CyberOne Session

12:35-1:15

CyberOne_logo_horiz.png

1:25-1:55

125 Sessions

2:00-2:30

200 Sessions

2:45-3:15

245 Sessions

3:20-3:50

320 Sessions

4:05-4:35

405 Sessions

4:35-6:00

Happy Hour
Field Stage: Closing comments and prizes

bottom of page