InfoSec World 2020 DIGITAL Program

All session times listed are in Eastern Daylight Time. 

Time Name Track
Monday, June 22, 2020
8:30 AM - 8:45 AMInfoSec World Welcome Remarks: I Believe, I Belong, I Matter ℠Keynotes
8:45 AM - 9:30 AMOpening Keynote: Leaders Needed: Preventing the Next Big BreachKeynotes
9:30 AM - 5:00 PMContainer Security SummitSummits
10:00 AM - 10:50 AMA1 Tales from the Trenches: A First-Hand Look at the Cybersecurity LandscapeSecurity Strategies
10:00 AM - 10:50 AMB1 Everything You Wanted to Know About Security Evangelism But Were Afraid to AskAwareness, Decisions & Devices: The Human Layer of Security
10:00 AM - 10:50 AMC1 Threat Modeling: Start EarlySecure Design
10:00 AM - 10:50 AMD1 How to Stop Fearware: Using Cyber AI to Defend the InboxHackers & Threats
10:00 AM - 10:50 AME1 Cyberlaw Year in Review: The Human Element Becomes CriticalManagement & Leadership
10:00 AM - 10:50 AMF1 Cybersecurity Controls: Keeping Enterprise Risk on TrackPrivacy & Risk
10:00 AM - 10:50 AMG1 Increasing Efficiency and Effectiveness with One-Off Tools and ScriptsInfrastructure & Operations
11:00 AM - 11:50 AMA2 You’ve Been Pwned… But Your Customers are the TargetSecurity Strategies
11:00 AM - 11:50 AMB2 Security Awareness How-To’s: Building an Enterprise Security Awareness Program from the Ground UpAwareness, Decisions & Devices: The Human Layer of Security
11:00 AM - 11:50 AMC2 Security Driven Networking & Getting Security RightSecure Design
11:00 AM - 11:50 AMD2 Developing an Effective Insider Threat Program: Automating the Detection of Risk IndicatorsHackers & Threats
11:00 AM - 11:50 AME2 Stop Ransomware with Speed and Precision Management & Leadership
11:00 AM - 11:50 AMF2 Ransomware and Extortion Incidents: Understanding the Legal LandscapePrivacy & Risk
11:00 AM - 11:50 AMG2 Information Security Frameworks and Control Catalogs: Differences, Selection, ImplementationInfrastructure & Operations
1:00 PM - 5:00 PMOn-Demand Workshop: Accelerating Cybersecurity with Artificial IntelligenceWorkshops
1:00 PM - 5:00 PMOn-Demand Workshop: Culture Lab: Making 'Me' MatterWorkshops
1:00 PM - 5:00 PMOn-Demand Workshop: Your NIST CSF Readiness AssessmentWorkshops
1:45 PM - 2:35 PMA3 The Assumption of Compromise Paradox: A Focus on Exfiltration Detection & PreventionSecurity Strategies
1:45 PM - 2:35 PMB3 Live Attack Response: Calculating the Human Cost of Security Awareness, Decisions & Devices: The Human Layer of Security
1:45 PM - 2:35 PMC3 Great Application Security Requires Mind(set) Over MatterSecure Design
1:45 PM - 2:35 PMD3 Beyond the Dark Web: What Will They Think of Next?Hackers & Threats
1:45 PM - 2:35 PME3 5G, Apps, Bots, IoT, AI, the Cloud & the Upcoming Cyberwars!Management & Leadership
1:45 PM - 2:35 PMF3 Bringing Cybersecurity & Privacy Together through NIST FrameworksPrivacy & Risk
1:45 PM - 2:35 PMG3 Hacking Firmware: The Unprotected Attack Surface of the EnterpriseInfrastructure & Operations
2:45 PM - 3:35 PMA4 When MFA Goes Wrong, And How To Set It RightSecurity Strategies
2:45 PM - 3:35 PMC4 Managing Cybersecurity and Privacy Risks in IoTSecure Design
2:45 PM - 3:35 PMD4 Digital Certificates 101Hackers & Threats
2:45 PM - 3:35 PME4 Cybersecurity... Past, Present, and Future…Management & Leadership
2:45 PM - 3:35 PMF4 Cracking the Cyber Liability CodePrivacy & Risk
3:55 PM - 4:55 PMA5 Security Orchestration Is Not About ToolsSecurity Strategies
3:55 PM - 4:55 PMC5 Gathering of the Vulnerability Wranglers 2.0 (PANEL)Secure Design
3:55 PM - 4:55 PMD5 An Anatomy of a Targeted Persistent Attack (TPA) on Commercial Routers and Means to MitigateHackers & Threats
3:55 PM - 4:55 PME5 How Our Boards Measure Our Security ProgramsManagement & Leadership
3:55 PM - 4:55 PMF5 Risk Exchanges: The Key to Vendor Risk Management EfficiencyPrivacy & Risk
3:55 PM - 4:55 PMG5 How PKI and SHAKEN/STIR Will Fix the Robocall ProblemInfrastructure & Operations
Tuesday, June 23, 2020
8:30 AM - 8:45 AMDay 2 Opening Remarks: Building Your Personal Board of DirectorsKeynotes
8:45 AM - 9:30 AMKeynote: Beyond the Curve: Visualizing TomorrowKeynotes
9:30 AM - 5:00 PMInfoSec Leadership SummitSummits
9:40 AM - 10:30 AMA6 Running a Remote SOCSecurity Strategies
9:40 AM - 10:30 AMB6 Can We Really Change Security Culture?Awareness, Decisions & Devices: The Human Layer of Security
9:40 AM - 10:30 AMC6 Colliding Worlds: Strategies for IT, OT, and IoT ConvergenceSecure Design
9:40 AM - 10:30 AMD6 Hacking Your Security DNAHackers & Threats
9:40 AM - 10:30 AME6 How to Patch "Stupid"Management & Leadership
9:40 AM - 10:30 AMG6 Exposing Speculative Execution Side Channel Methods: What You Should Know and What You Should DoInfrastructure & Operations
10:40 AM - 11:30 AMA7 Malware and Machine Learning: A Dangerous Combination?Security Strategies
10:40 AM - 11:30 AMB7 The Psychology of Social Engineering – The “Soft” Side of CybercrimeAwareness, Decisions & Devices: The Human Layer of Security
10:40 AM - 11:30 AMC7 To Design Securely, You Have to be Able to Measure Your SecuritySecure Design
10:40 AM - 11:30 AMD7 The Modus Operandi of EV Certificate Fraudsters: Findings from the FieldHackers & Threats
10:40 AM - 11:30 AME7 ISSA/ESG’s 4th Annual Research Survey on the Cybersecurity Profession – Is It Getting Better?Management & Leadership
10:40 AM - 11:30 AMF7 An Offensive Approach to Managing Your Third-Party RiskPrivacy & Risk
10:40 AM - 11:30 AMG7 Getting the Most Out of Your Covert Physical Security Assessment: A Client’s GuideInfrastructure & Operations
1:30 PM - 2:30 PMKeynote: History Doesn’t Repeat, It Rhymes – Operationalizing Security in the DevSecOps EraKeynotes
3:00 PM - 3:50 PMA8 Cyber + Traditional Security Program IntegrationSecurity Strategies
3:00 PM - 3:50 PMB8 BEC Isn’t A Security Issue, It’s a Social Engineering Issue – That AI Can SolveAwareness, Decisions & Devices: The Human Layer of Security
3:00 PM - 3:50 PMC8 Delivering Secure Code FasterSecure Design
3:00 PM - 3:50 PMD8 Training Your Employees on Safeguarding Your OrganizationHackers & Threats
3:00 PM - 3:50 PME8 Five Things That MatterManagement & Leadership
3:00 PM - 3:50 PMF8 Case Study: Performing a Global IT Risk AssessmentPrivacy & Risk
3:00 PM - 3:50 PMG8 New Attack Patterns: Targeting the Keys to the KingdomInfrastructure & Operations
4:00 PM - 4:50 PMA9 Rise of the Machines – The Importance of Security AutomationSecurity Strategies
4:00 PM - 4:50 PMB9 Security Awareness and the Landscape of Emerging ThreatsAwareness, Decisions & Devices: The Human Layer of Security
4:00 PM - 4:50 PMC9 Mitigating at Design TimeSecure Design
4:00 PM - 4:50 PMD9: Foes, Fixes, & Foundations: Trending Threats and Proper Responses for 2020Hackers & Threats
4:00 PM - 4:50 PME9 Level Up! Business Communications Strategies to Advance and Lead Projects with PrecisionManagement & Leadership
4:00 PM - 4:50 PMF9 The vCISO Journey: So You Want to be a vCISO?Privacy & Risk
4:00 PM - 4:50 PMG9 Protect Your Data and the Air Gapped NetworkInfrastructure & Operations
Wednesday, June 24, 2020
8:30 AM - 8:45 AMDay 3 Opening RemarksKeynotes
8:45 AM - 9:30 AMKeynote: Real World Intelligence and Global Cybersecurity ThreatsKeynotes
9:00 AM - 5:00 PMCloud Security SummitSummits
10:25 AM - 11:15 AMA10 East vs West: How the Coasts Approach Information Security DifferentlySecurity Strategies
10:25 AM - 11:15 AMB10 People are the Perimeter: Understanding How All of Us Affect Cyber RiskAwareness, Decisions & Devices: The Human Layer of Security
10:25 AM - 11:15 AMD10 Agile Security PatchingHackers & Threats
10:25 AM - 11:15 AME10 Challenging Insider Threats: Cyberspace Insider Threat Triage (CITT) PlanManagement & Leadership
10:25 AM - 11:15 AMF10 Risky Business: Is Your Cybersecurity on Cruise ControlPrivacy & Risk
10:25 AM - 11:15 AMG10 How to Implement the “Triangle” of Network Security ManagementInfrastructure & Operations
11:20 AM - 12:15 PMClosing Keynote: CISO Perspectives: Developing A Cyber Strategy for Post Quarantine Return To Work Keynotes