InfoSec World 2020 Conference Program

Time Name Track
Saturday, June 20, 2020
9:00 AM - 5:00 PMContainer Security SummitSummits
9:00 AM - 5:00 PMWorkshop 1: Adversarial Attacks & Detections: Improving Your Security Posture with Purple Teams (Two-Day Workshop) (Part 1 of 2)Workshops
9:00 AM - 5:00 PMWorkshop 2: DevSecOps and Cultural Transformation (Two-Day Workshop) (Part 1 of 2)Workshops
Sunday, June 21, 2020
9:00 AM - 5:00 PMInfoSec Leadership SummitSummits
9:00 AM - 5:00 PMWorkshop 1: Adversarial Attacks & Detections: Improving Your Security Posture with Purple Teams (Two-Day Workshop) (Part 2 of 2)Workshops
9:00 AM - 5:00 PMWorkshop 2: DevSecOps and Cultural Transformation (Two-Day Workshop) (Part 2 of 2)Workshops
9:00 AM - 5:00 PMWorkshop 3: Wireless Workshop: WiFi Security Training in a Virtualized Cyber RangeWorkshops
Monday, June 22, 2020
8:45 AM - 9:30 AMOpening Keynote: Leaders Needed: Preventing the Next Big BreachKeynotes
10:00 AM - 10:50 AMA1 Tales from the Trenches: A First-Hand Look at the Cybersecurity LandscapeSecurity Strategies
10:00 AM - 10:50 AMC1 Threat Modeling: Start EarlySecure Design
10:00 AM - 10:50 AMD1 Faking It: Combatting Email Impersonation with AIHackers & Threats
10:00 AM - 10:50 AME1 Cyberlaw Year in Review: The Human Element Becomes CriticalManagement & Leadership
10:00 AM - 10:50 AMF1 Cybersecurity Controls: Keeping Enterprise Risk on TrackPrivacy & Risk
10:00 AM - 10:50 AMG1 Increasing Efficiency and Effectiveness with One-Off Tools and ScriptsInfrastructure & Operations
11:00 AM - 11:50 AMA2 You’ve Been Pwned… But Your Customers are the TargetSecurity Strategies
11:00 AM - 11:50 AMB2 Security Awareness How-To’s: Building an Enterprise Security Awareness Program from the Ground UpAwareness, Decisions & Devices: The Human Layer of Security
11:00 AM - 11:50 AMC2 Zero Trust Access – Tenets, Tech and RealitiesSecure Design
11:00 AM - 11:50 AMD2 Developing an Effective Insider Threat Program: Automating the Detection of Risk IndicatorsHackers & Threats
11:00 AM - 11:50 AMF2 Ransomware and Extortion Incidents: Understanding the Legal LandscapePrivacy & Risk
1:45 PM - 2:35 PMA3 The Assumption of Compromise Paradox: A Focus on Exfiltration Detection & PreventionSecurity Strategies
1:45 PM - 2:35 PMB3 Live Attack Response: Calculating the Human Cost of Security Awareness, Decisions & Devices: The Human Layer of Security
1:45 PM - 4:55 PMCapture The Flag 101 - HANDS-ONCapture the Flag
1:45 PM - 2:35 PMD3 Beyond the Dark Web: What Will They Think of Next?Hackers & Threats
1:45 PM - 2:35 PME3 Late-Breaking SessionManagement & Leadership
1:45 PM - 2:35 PMF3 Bringing Cybersecurity & Privacy Together through NIST FrameworksPrivacy & Risk
1:45 PM - 2:35 PMG3 Hacking Firmware: The Unprotected Attack Surface of the EnterpriseInfrastructure & Operations
2:45 PM - 3:35 PMA4 The Network Is Going Dark: Why Decryption Matters for SecOpsSecurity Strategies
2:45 PM - 3:35 PMB4 Training Your Employees on Safeguarding Your OrganizationAwareness, Decisions & Devices: The Human Layer of Security
2:45 PM - 3:35 PMC4 Managing Cybersecurity and Privacy Risks in IoTSecure Design
2:45 PM - 3:35 PMD4 Digital Certificates 101Hackers & Threats
2:45 PM - 3:35 PME4 Cybersecurity... Past, Present, and Future…Management & Leadership
2:45 PM - 3:35 PMF4 Cracking the Cyber Liability CodePrivacy & Risk
2:45 PM - 3:35 PMG4 Embracing the Digital Business Transformation with Zero TrustInfrastructure & Operations
3:55 PM - 4:10 PMA5.1 Turn on a Dime: Keep Cybersecurity Staff Trained and Engaged on Changing TechnologySecurity Strategies
3:55 PM - 4:55 PMC5 Gathering of the Vulnerability Wranglers 2.0 (PANEL)Secure Design
3:55 PM - 4:55 PMD5 An Anatomy of a Targeted Persistent Attack (TPA) on Commercial Routers and Means to MitigateHackers & Threats
3:55 PM - 4:55 PME5 How Our Boards Measure Our Security ProgramsManagement & Leadership
3:55 PM - 4:55 PMF5 Risk Exchanges: The Key to Vendor Risk Management EfficiencyPrivacy & Risk
3:55 PM - 4:55 PMG5 New Attack Patterns: Targeting the Keys to the KingdomInfrastructure & Operations
4:15 PM - 4:30 PMA5.2 Security Orchestration Is Not About ToolsSecurity Strategies
Tuesday, June 23, 2020
7:30 AM - 8:15 AMPower Breakfast Session: Vendor Risk Management: Overcoming Today’s Most Common Challenges  
8:45 AM - 9:30 AMKeynote: Beyond the Curve: Visualizing TomorrowKeynotes
9:40 AM - 10:30 AMA6 All Your Passwords Are Belong to Us: Changing the Group-Think on Password SecuritySecurity Strategies
9:40 AM - 10:30 AMB6 Can We Really Change Security Culture?Awareness, Decisions & Devices: The Human Layer of Security
9:40 AM - 10:30 AMC6 Colliding Worlds: Strategies for IT, OT, and IoT ConvergenceSecure Design
9:40 AM - 10:30 AMD6 Hacking Your Security DNAHackers & Threats
9:40 AM - 10:30 AME6 How to Patch "Stupid"Awareness, Decisions & Devices: The Human Layer of Security
9:40 AM - 10:30 AMF6 Mergers and Acquisitions: How to Transfer Your Cyber RiskPrivacy & Risk
10:40 AM - 11:30 AMA7 Malware and Machine Learning: A Dangerous Combination?Security Strategies
10:40 AM - 11:30 AMB7 The Psychology of Social Engineering – The “Soft” Side of CybercrimeAwareness, Decisions & Devices: The Human Layer of Security
10:40 AM - 11:30 AMC7 To Design Securely, You Have to be Able to Measure Your SecuritySecure Design
10:40 AM - 11:30 AMD7 The Modus Operandi of EV Certificate Fraudsters: Findings from the FieldHackers & Threats
10:40 AM - 11:30 AME7 ISSA/ESG’s 4th Annual Research Survey on the Cybersecurity Profession – Is It Getting Better?Management & Leadership
10:40 AM - 11:30 AMF7 An Offensive Approach to Managing Your Third-Party RiskPrivacy & Risk
10:40 AM - 11:30 AMG7 Getting the Most Out of Your Covert Physical Security Assessment: A Client’s GuideInfrastructure & Operations
1:30 PM - 2:30 PMKeynote: History Doesn’t Repeat, It Rhymes – Operationalizing Security in the DevSecOps EraKeynotes
2:30 PM - 2:45 PMTech Spotlight: The Case for Isolation 
3:00 PM - 3:50 PMA8 Cyber + Traditional Security Program IntegrationSecurity Strategies
3:00 PM - 3:50 PMB8 BEC Isn’t A Security Issue, It’s a Social Engineering Issue – That AI Can SolveAwareness, Decisions & Devices: The Human Layer of Security
3:00 PM - 3:50 PMC8 Delivering Secure Code FasterSecure Design
3:00 PM - 3:50 PME8 Five Things That MatterManagement & Leadership
3:00 PM - 3:50 PMF8 Case Study: Performing a Global IT Risk AssessmentPrivacy & Risk
4:00 PM - 4:50 PMA9 Rise of the Machines – The Importance of Security AutomationSecurity Strategies
4:00 PM - 4:50 PMB9 Security Awareness and the Landscape of Emerging ThreatsAwareness, Decisions & Devices: The Human Layer of Security
4:00 PM - 4:50 PMC9 Mitigating at Design TimeSecure Design
4:00 PM - 4:50 PMD9 Feed the Beast! Threat Hunt Use-Cases from the Front Lines Hackers & Threats
4:00 PM - 4:50 PME9 Level Up! Business Communications Strategies to Advance and Lead Projects with PrecisionManagement & Leadership
4:00 PM - 4:50 PMG9 Protect Your Data and the Air Gapped NetworkInfrastructure & Operations
Wednesday, June 24, 2020
8:00 AM - 8:45 AMPower Breakfast Session: Security Is More Than Looking Good On Paper  
8:45 AM - 9:30 AMKeynote: Real World Intelligence and Global Cybersecurity ThreatsKeynotes
10:25 AM - 11:15 AMA10 East vs West: How the Coasts Approach Information Security DifferentlySecurity Strategies
10:25 AM - 11:15 AMB10 Challenging Insider Threats: Cyberspace Insider Threat Triage (CITT) PlanHackers & Threats
10:25 AM - 11:15 AMD10 Agile Security PatchingHackers & Threats
10:25 AM - 11:15 AME10 Everything You Wanted to Know About Security Evangelism But Were Afraid to AskManagement & Leadership
10:25 AM - 11:15 AMF10 Risky Business: Is Your Cybersecurity on Cruise ControlPrivacy & Risk
10:25 AM - 11:15 AMG10 How to Implement the “Triangle” of Network Security ManagementInfrastructure & Operations
11:30 AM - 12:00 PMKeynote: The Fight for Our Cyber Soul: Technology, Profits, and Prioritizing CybersecurityKeynotes
12:00 PM - 12:30 PMKeynote: It's Not CybersecurityKeynotes
1:00 PM - 5:00 PMWorkshop 4: Accelerating Cybersecurity with Artificial IntelligenceWorkshops
1:00 PM - 5:00 PMWorkshop 5: Benchmarking LIVE!: Endpoint SecurityWorkshops
1:00 PM - 5:00 PMWorkshop 6: Culture Lab: Making 'Me' MatterWorkshops
1:00 PM - 5:00 PMWorkshop 7: Your NIST CSF Readiness AssessmentWorkshops
Thursday, June 25, 2020
9:00 AM - 5:00 PMCloud Security SummitSummits
9:00 AM - 5:00 PMWorkshop 8: Building an AppSec Program with OWASPWorkshops
9:00 AM - 5:00 PMWorkshop 9: Why the Cyber Technician Needs to Become an Enterprise Leader (and How!)Workshops