2015 Agenda-at-a

Transcription

2015 Agenda-at-a
AGENDA
Tuesday May 12, 2015
7:30 AM
Registration for Pre-Conference Workshops Opens
7:30 – 8:00 AM
Continental Breakfast
8:00 AM to 4:00 PM
Pre-Conference Workshops (Full-Day)
1. Cyber Warfare Training and Threat Simulation (Presented by Blackfin Security)
2. Introduction to Malware Analysis (Presented by KoreLogic Security)
3. Open FAIR Training (Presented by The Open Group and CXOWARE)
4. Emerging Issues in IT Auditing (Presented by Deloitte)
12:00 to 12:45 PM
Lunch for Pre-Conference
1:00 to 4:00 PM
Pre-Conference Workshop (Half-Day)
Security Leadership Roundtable (Presented by Ernst & Young)
3:15 to 3:30 PM
PM Break for Pre-Conference participants
4:15 to 5:15 PM
Conference Opening Keynote Session – Featuring Brian Krebs
5:15 to 6:45 PM
Welcome Reception in Exhibit Hall
Wednesday May 13, 2015
7:00 AM
Conference Registration Opens
7:00 to 8:00 AM
Breakfast
8:00 to 9:15 AM
Morning Keynote Session Featuring Eddie Mize
9:25 to 10:25 AM
Workshops – Session One
101. The Quantitative Risk Management Process
102. Rescue Your Analytics From (un)Certain Doom
103. The Inception Framework: Cloud Based Targeted Attack Infrastructure
104. Cyber Plagues: An Approach to New Threats
105. Learning to Walk, Again
106. Windows PowerShell for the Power Auditor
10:25 to 11:15 AM
Networking Break in Exhibit Hall
11:15 AM to 12:15 PM
Workshops – Session Two
201. Using Service Supportability for IT Risk Management
202. You’re Under a Distributed Denial of Service Attack. Now What?
203. Malware/Threat Intel Analysis Lab Essentials
204. Honeypots for Active Defense
205. Colorado CISOs Speak – A Panel Discussion
206. There is a Crippling Cybersecurity Attack Coming Your Way! Can Effective
Legislation Stop It?
12:30 to 1:15 PM
Lunch
1:15 to 2:00 PM
Dessert in Exhibit Hall
2:00 to 3:00 PM
Workshops – Session Three
301. It Takes Sync to Make DR Go Right. It takes Layer 2 to Make It Out of Sight.
302. Implementing an Automated Incident Response Architecture
303. A Malware Developer’s Guide to Blocking an Attack
304. Hidden Trust, A Dark Web of Trust Relationships That Your Organization Doesn’t
Know About
305. The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources
306. Moving to a Data Analytics Culture
307. Risk is What’s Left When Compliance Doesn’t Equal Security
3:15 to 4:15 PM
Workshops – Session Four
401. SDN Security: Two Sides of the Same Coin
402. Performing Advanced Incident Response
403. Scaling Security in Agile Scrum
404. Automate or Die! How to Scale and Evolve to Fix Our Broken Industry
405. An (Over) Simplified Approach to Data Collection
406. FedRAMP: The New Baseline for Security and Compliance in the Cloud
4:30 to 5:30 PM
Closing Keynote Session with Chris Nickerson, Reception and Prize Drawings