InfoSec World 2020 Conference Program

Time Name Track
Saturday, March 28, 2020
9:00 AM - 5:00 PMContainer Security SummitSummits
9:00 AM - 5:00 PMWorkshop 1: Adversarial Attacks & Detections: Improving Your Security Posture with Purple Teams (Two-Day Workshop) (Part 1 of 2)Workshops
9:00 AM - 5:00 PMWorkshop 2: DevSecOps and Cultural Transformation (Two-Day Workshop) (Part 1 of 2)Workshops
Sunday, March 29, 2020
9:00 AM - 5:00 PMInfoSec Leadership SummitSummits
9:00 AM - 5:00 PMWorkshop 3: Wireless Workshop: WiFi Security Training in a Virtualized Cyber RangeWorkshops
Monday, March 30, 2020
8:45 AM - 9:30 AMOpening Keynote: Leaders Needed: Preventing the Next Big BreachKeynotes
10:00 AM - 10:50 AMA1 Tales from the Trenches: A First-Hand Look at the Cybersecurity LandscapeSecurity Strategies
10:00 AM - 10:50 AMB1 How to Patch "Stupid"Awareness, Decisions & Devices: The Human Layer of Security
10:00 AM - 10:50 AMC1 Threat Modeling: Start EarlySecure Design
10:00 AM - 10:50 AMD1 Late-Breaking Session Presented by DarktraceHackers & Threats
10:00 AM - 10:50 AME1 Cyberlaw Year in Review: The Human Element Becomes CriticalManagement & Leadership
10:00 AM - 10:50 AMF1 Cybersecurity Controls: Keeping Enterprise Risk on TrackPrivacy & Risk
10:00 AM - 10:50 AMG1 Increasing Efficiency and Effectiveness with One-Off Tools and ScriptsInfrastructure & Operations
11:00 AM - 11:50 AMA2 You’ve Been Pwned… But Your Customers are the TargetSecurity Strategies
11:00 AM - 11:50 AMB2 Security Awareness How-To’s: Building an Enterprise Security Awareness Program from the Ground UpAwareness, Decisions & Devices: The Human Layer of Security
11:00 AM - 11:50 AMC2 Late-Breaking SessionSecure Design
11:00 AM - 11:50 AMD2 Developing an Effective Insider Threat Program: Automating the Detection of Risk IndicatorsHackers & Threats
11:00 AM - 11:50 AME2 How Do I Advance in My Career? Finding the Road to Success!Management & Leadership
11:00 AM - 11:50 AMF2 Managing Risk in the Privacy Alphabet SoupPrivacy & Risk
11:00 AM - 11:50 AMG2 Information Security Frameworks and Control Catalogs: Differences, Selection, ImplementationInfrastructure & Operations
1:45 PM - 2:35 PMA3 The Assumption of Compromise Paradox: A Focus on Exfiltration Detection & PreventionSecurity Strategies
1:45 PM - 2:35 PMB3 Late-Breaking SessionAwareness, Decisions & Devices: The Human Layer of Security
1:45 PM - 2:35 PMC3 Great Application Security Requires Mind(set) Over MatterSecure Design
1:45 PM - 4:55 PMCapture The Flag 101 - HANDS-ONCapture the Flag
1:45 PM - 2:35 PMD3 Beyond the Dark Web: What Will They Think of Next?Hackers & Threats
1:45 PM - 2:35 PME3 Late-Breaking SessionManagement & Leadership
1:45 PM - 2:35 PMF3 Bringing Cybersecurity & Privacy Together through NIST FrameworksPrivacy & Risk
1:45 PM - 2:35 PMG3 Hacking Firmware: The Unprotected Attack Surface of the EnterpriseInfrastructure & Operations
2:45 PM - 3:35 PMA4 Late-Breaking SessionSecurity Strategies
2:45 PM - 3:35 PMB4 Training Your Employees on Safeguarding Your OrganizationAwareness, Decisions & Devices: The Human Layer of Security
2:45 PM - 3:35 PMC4 Managing Cybersecurity and Privacy Risks in IoTSecure Design
2:45 PM - 3:35 PMD4 Digital Certificates 101Hackers & Threats
2:45 PM - 3:35 PME4 Cybersecurity... Past, Present, and Future…Management & Leadership
2:45 PM - 3:35 PMF4 Cracking the Cyber Liability CodePrivacy & Risk
2:45 PM - 3:35 PMG4 Late-Breaking SessionInfrastructure & Operations
3:55 PM - 4:10 PMA5.1 Turn on a Dime: Keep Cybersecurity Staff Trained and Engaged on Changing TechnologySecurity Strategies
3:55 PM - 4:55 PMB5 Zero to Sixty: Making Security Programmatic and CulturalAwareness, Decisions & Devices: The Human Layer of Security
3:55 PM - 4:55 PMC5 Gathering of the Vulnerability Wranglers 2.0 (PANEL)Secure Design
3:55 PM - 4:55 PMD5 An Anatomy of a Targeted Persistent Attack (TPA) on Commercial Routers and Means to MitigateHackers & Threats
3:55 PM - 4:55 PME5 How My Board Measures our Security ProgramManagement & Leadership
3:55 PM - 4:55 PMF5 Late-Breaking SessionPrivacy & Risk
3:55 PM - 4:55 PMG5 How PKI and SHAKEN/STIR Will Fix the Robocall ProblemInfrastructure & Operations
4:15 PM - 4:30 PMA5.2 Security Orchestration Is Not About ToolsSecurity Strategies
4:35 PM - 4:50 PMA5.3 Cybersecurity and Privacy Risks: The Consumers PerspectiveSecurity Strategies
Tuesday, March 31, 2020
8:45 AM - 9:30 AMKeynote: Beyond the Curve: Visualizing TomorrowKeynotes
9:40 AM - 10:30 AMA6 All Your Passwords Are Belong to Us: Changing the Group-Think on Password SecuritySecurity Strategies
9:40 AM - 10:30 AMB6 Can We Really Change Security Culture?Awareness, Decisions & Devices: The Human Layer of Security
9:40 AM - 10:30 AMC6 Colliding Worlds: Strategies for IT, OT, and IoT ConvergenceSecure Design
9:40 AM - 10:30 AMD6 Late-Breaking SessionHackers & Threats
9:40 AM - 10:30 AME6 Everything You Wanted to Know About Security Evangelism But Were Afraid to AskManagement & Leadership
9:40 AM - 10:30 AMF6 Mergers and Acquisitions: How to Transfer Your Cyber RiskPrivacy & Risk
9:40 AM - 10:30 AMG6 Exposing Speculative Execution Side Channel Methods: What You Should Know and What You Should DoInfrastructure & Operations
10:40 AM - 11:30 AMA7 Malware and Machine Learning: A Dangerous Combination?Security Strategies
10:40 AM - 11:30 AMB7 The Psychology of Social Engineering – The “Soft” Side of CybercrimeAwareness, Decisions & Devices: The Human Layer of Security
10:40 AM - 11:30 AMC7 Late-Breaking SessionSecure Design
10:40 AM - 11:30 AMD7 The Modus Operandi of EV Certificate Fraudsters: Findings from the FieldHackers & Threats
10:40 AM - 11:30 AME7 Late-Breaking SessionManagement & Leadership
10:40 AM - 11:30 AMF7 An Offensive Approach to Managing Your Third-Party RiskPrivacy & Risk
10:40 AM - 11:30 AMG7 Getting the Most Out of Your Covert Physical Security Assessment: A Client’s GuideInfrastructure & Operations
3:00 PM - 3:50 PMA8 Cyber + Traditional Security Program IntegrationSecurity Strategies
3:00 PM - 3:50 PMB8 Late-Breaking SessionAwareness, Decisions & Devices: The Human Layer of Security
3:00 PM - 3:50 PMC8 Tales of AppSec: Common and Crazy Things You Should AddressSecure Design
3:00 PM - 3:50 PMD8 Challenging Insider Threats: Cyberspace Insider Threat Triage (CITT) PlanHackers & Threats
3:00 PM - 3:50 PME8 Five Things That MatterManagement & Leadership
3:00 PM - 3:50 PMF8 Case Study: Performing a Global IT Risk AssessmentPrivacy & Risk
3:00 PM - 3:50 PMG8 Late-Breaking SessionInfrastructure & Operations
4:00 PM - 4:50 PMA9 Late-Breaking SessionSecurity Strategies
4:00 PM - 4:50 PMB9 Security Awareness and the Landscape of Emerging ThreatsAwareness, Decisions & Devices: The Human Layer of Security
4:00 PM - 4:50 PMC9 Mitigating at Design TimeSecure Design
4:00 PM - 4:50 PMD9 Feed the Beast! Threat Hunt Use-Cases from the Front Lines Hackers & Threats
4:00 PM - 4:50 PME9 Level Up! Business Communications Strategies to Advance and Lead Projects with PrecisionManagement & Leadership
4:00 PM - 4:50 PMF9 Late-Breaking SessionPrivacy & Risk
4:00 PM - 4:50 PMG9 Protect Your Data and the Air Gapped NetworkInfrastructure & Operations
Wednesday, April 1, 2020
10:30 AM - 11:20 AMA10 East vs West: How the Coasts Approach Information Security DifferentlySecurity Strategies
10:30 AM - 11:20 AMB10 People are the Perimeter: Understanding How All of Us Affect Cyber RiskAwareness, Decisions & Devices: The Human Layer of Security
10:30 AM - 11:20 AMC10 DevSecOps in the Real WorldSecure Design
10:30 AM - 11:20 AMD10 Speed and Control: Moving Toward Proactive Cyber DefenseHackers & Threats
10:30 AM - 11:20 AME10 The vCISO Journey: So You Want to be a vCISO?Management & Leadership
10:30 AM - 11:20 AMF10 Risky Business: Is Your Cybersecurity on Cruise ControlPrivacy & Risk
10:30 AM - 11:20 AMG10 How to Implement the “Triangle” of Network Security ManagementInfrastructure & Operations
11:30 AM - 12:15 PMKeynote: The Fight for Our Cyber Soul: Technology, Profits, and Prioritizing CybersecurityKeynotes
1:00 PM - 5:00 PMWorkshop 4: Accelerating Cybersecurity with Artificial IntelligenceWorkshops
1:00 PM - 5:00 PMWorkshop 5: Benchmarking LIVE!: Endpoint SecurityWorkshops
1:00 PM - 5:00 PMWorkshop 6: Culture Lab: Making 'Me' MatterWorkshops
1:00 PM - 5:00 PMWorkshop 7: Your NIST CSF Readiness AssessmentWorkshops
Thursday, April 2, 2020
9:00 AM - 5:00 PMCloud Security SummitSummits
9:00 AM - 5:00 PMWorkshop 8: Building an AppSec Program with OWASPWorkshops
9:00 AM - 5:00 PMWorkshop 9: Why the Cyber Technician Needs to Become an Enterprise Leader (and How!)Workshops