Monday, June 22, 2020 |
8:30 AM - 8:45 AM | InfoSec World Welcome Remarks: I Believe, I Belong, I Matter ℠ | Keynotes |
8:45 AM - 9:30 AM | Opening Keynote: Leaders Needed: Preventing the Next Big Breach | Keynotes |
9:30 AM - 5:00 PM | Container Security Summit | Summits |
10:00 AM - 10:50 AM | A1 Tales from the Trenches: A First-Hand Look at the Cybersecurity Landscape | Security Strategies |
10:00 AM - 10:50 AM | B1 Everything You Wanted to Know About Security Evangelism But Were Afraid to Ask | Awareness, Decisions & Devices: The Human Layer of Security |
10:00 AM - 10:50 AM | C1 Threat Modeling: Start Early | Secure Design |
10:00 AM - 10:50 AM | D1 How to Stop Fearware: Using Cyber AI to Defend the Inbox | Hackers & Threats |
10:00 AM - 10:50 AM | E1 Cyberlaw Year in Review: The Human Element Becomes Critical | Management & Leadership |
10:00 AM - 10:50 AM | F1 Cybersecurity Controls: Keeping Enterprise Risk on Track | Privacy & Risk |
10:00 AM - 10:50 AM | G1 Increasing Efficiency and Effectiveness with One-Off Tools and Scripts | Infrastructure & Operations |
11:00 AM - 11:50 AM | A2 You’ve Been Pwned… But Your Customers are the Target | Security Strategies |
11:00 AM - 11:50 AM | B2 Security Awareness How-To’s: Building an Enterprise Security Awareness Program from the Ground Up | Awareness, Decisions & Devices: The Human Layer of Security |
11:00 AM - 11:50 AM | C2 Security Driven Networking & Getting Security Right | Secure Design |
11:00 AM - 11:50 AM | D2 Developing an Effective Insider Threat Program: Automating the Detection of Risk Indicators | Hackers & Threats |
11:00 AM - 11:50 AM | E2 Stop Ransomware with Speed and Precision | Management & Leadership |
11:00 AM - 11:50 AM | F2 Ransomware and Extortion Incidents: Understanding the Legal Landscape | Privacy & Risk |
11:00 AM - 11:50 AM | G2 Information Security Frameworks and Control Catalogs: Differences, Selection, Implementation | Infrastructure & Operations |
1:00 PM - 5:00 PM | On-Demand Workshop: Accelerating Cybersecurity with Artificial Intelligence | Workshops |
1:00 PM - 5:00 PM | On-Demand Workshop: Culture Lab: Making 'Me' Matter | Workshops |
1:00 PM - 5:00 PM | On-Demand Workshop: Your NIST CSF Readiness Assessment | Workshops |
1:45 PM - 2:35 PM | A3 The Assumption of Compromise Paradox: A Focus on Exfiltration Detection & Prevention | Security Strategies |
1:45 PM - 2:35 PM | B3 Live Attack Response: Calculating the Human Cost of Security | Awareness, Decisions & Devices: The Human Layer of Security |
1:45 PM - 2:35 PM | C3 Great Application Security Requires Mind(set) Over Matter | Secure Design |
1:45 PM - 2:35 PM | D3 Beyond the Dark Web: What Will They Think of Next? | Hackers & Threats |
1:45 PM - 2:35 PM | E3 5G, Apps, Bots, IoT, AI, the Cloud & the Upcoming Cyberwars! | Management & Leadership |
1:45 PM - 2:35 PM | F3 Bringing Cybersecurity & Privacy Together through NIST Frameworks | Privacy & Risk |
1:45 PM - 2:35 PM | G3 Hacking Firmware: The Unprotected Attack Surface of the Enterprise | Infrastructure & Operations |
2:45 PM - 3:35 PM | A4 When MFA Goes Wrong, And How To Set It Right | Security Strategies |
2:45 PM - 3:35 PM | C4 Managing Cybersecurity and Privacy Risks in IoT | Secure Design |
2:45 PM - 3:35 PM | D4 Digital Certificates 101 | Hackers & Threats |
2:45 PM - 3:35 PM | E4 Cybersecurity... Past, Present, and Future… | Management & Leadership |
2:45 PM - 3:35 PM | F4 Cracking the Cyber Liability Code | Privacy & Risk |
3:55 PM - 4:55 PM | A5 Security Orchestration Is Not About Tools | Security Strategies |
3:55 PM - 4:55 PM | C5 Gathering of the Vulnerability Wranglers 2.0 (PANEL) | Secure Design |
3:55 PM - 4:55 PM | D5 An Anatomy of a Targeted Persistent Attack (TPA) on Commercial Routers and Means to Mitigate | Hackers & Threats |
3:55 PM - 4:55 PM | E5 How Our Boards Measure Our Security Programs | Management & Leadership |
3:55 PM - 4:55 PM | F5 Risk Exchanges: The Key to Vendor Risk Management Efficiency | Privacy & Risk |
3:55 PM - 4:55 PM | G5 How PKI and SHAKEN/STIR Will Fix the Robocall Problem | Infrastructure & Operations |
Tuesday, June 23, 2020 |
8:30 AM - 8:45 AM | Day 2 Opening Remarks: Building Your Personal Board of Directors | Keynotes |
8:45 AM - 9:30 AM | Keynote: Beyond the Curve: Visualizing Tomorrow | Keynotes |
9:30 AM - 5:00 PM | InfoSec Leadership Summit | Summits |
9:40 AM - 10:30 AM | A6 Running a Remote SOC | Security Strategies |
9:40 AM - 10:30 AM | B6 Can We Really Change Security Culture? | Awareness, Decisions & Devices: The Human Layer of Security |
9:40 AM - 10:30 AM | C6 Colliding Worlds: Strategies for IT, OT, and IoT Convergence | Secure Design |
9:40 AM - 10:30 AM | D6 Hacking Your Security DNA | Hackers & Threats |
9:40 AM - 10:30 AM | E6 How to Patch "Stupid" | Management & Leadership |
9:40 AM - 10:30 AM | G6 Exposing Speculative Execution Side Channel Methods: What You Should Know and What You Should Do | Infrastructure & Operations |
10:40 AM - 11:30 AM | A7 Malware and Machine Learning: A Dangerous Combination? | Security Strategies |
10:40 AM - 11:30 AM | B7 The Psychology of Social Engineering – The “Soft” Side of Cybercrime | Awareness, Decisions & Devices: The Human Layer of Security |
10:40 AM - 11:30 AM | C7 To Design Securely, You Have to be Able to Measure Your Security | Secure Design |
10:40 AM - 11:30 AM | D7 The Modus Operandi of EV Certificate Fraudsters: Findings from the Field | Hackers & Threats |
10:40 AM - 11:30 AM | E7 ISSA/ESG’s 4th Annual Research Survey on the Cybersecurity Profession – Is It Getting Better? | Management & Leadership |
10:40 AM - 11:30 AM | F7 An Offensive Approach to Managing Your Third-Party Risk | Privacy & Risk |
10:40 AM - 11:30 AM | G7 Getting the Most Out of Your Covert Physical Security Assessment: A Client’s Guide | Infrastructure & Operations |
1:30 PM - 2:30 PM | Keynote: History Doesn’t Repeat, It Rhymes – Operationalizing Security in the DevSecOps Era | Keynotes |
3:00 PM - 3:50 PM | A8 Cyber + Traditional Security Program Integration | Security Strategies |
3:00 PM - 3:50 PM | B8 BEC Isn’t A Security Issue, It’s a Social Engineering Issue – That AI Can Solve | Awareness, Decisions & Devices: The Human Layer of Security |
3:00 PM - 3:50 PM | C8 Delivering Secure Code Faster | Secure Design |
3:00 PM - 3:50 PM | D8 Training Your Employees on Safeguarding Your Organization | Hackers & Threats |
3:00 PM - 3:50 PM | E8 Five Things That Matter | Management & Leadership |
3:00 PM - 3:50 PM | F8 Case Study: Performing a Global IT Risk Assessment | Privacy & Risk |
3:00 PM - 3:50 PM | G8 New Attack Patterns: Targeting the Keys to the Kingdom | Infrastructure & Operations |
4:00 PM - 4:50 PM | A9 Rise of the Machines – The Importance of Security Automation | Security Strategies |
4:00 PM - 4:50 PM | B9 Security Awareness and the Landscape of Emerging Threats | Awareness, Decisions & Devices: The Human Layer of Security |
4:00 PM - 4:50 PM | C9 Mitigating at Design Time | Secure Design |
4:00 PM - 4:50 PM | D9: Foes, Fixes, & Foundations: Trending Threats and Proper Responses for 2020 | Hackers & Threats |
4:00 PM - 4:50 PM | E9 Level Up! Business Communications Strategies to Advance and Lead Projects with Precision | Management & Leadership |
4:00 PM - 4:50 PM | F9 The vCISO Journey: So You Want to be a vCISO? | Privacy & Risk |
4:00 PM - 4:50 PM | G9 Protect Your Data and the Air Gapped Network | Infrastructure & Operations |
Wednesday, June 24, 2020 |
8:30 AM - 8:45 AM | Day 3 Opening Remarks | Keynotes |
8:45 AM - 9:30 AM | Keynote: Real World Intelligence and Global Cybersecurity Threats | Keynotes |
9:00 AM - 5:00 PM | Cloud Security Summit | Summits |
10:25 AM - 11:15 AM | A10 East vs West: How the Coasts Approach Information Security Differently | Security Strategies |
10:25 AM - 11:15 AM | B10 People are the Perimeter: Understanding How All of Us Affect Cyber Risk | Awareness, Decisions & Devices: The Human Layer of Security |
10:25 AM - 11:15 AM | D10 Agile Security Patching | Hackers & Threats |
10:25 AM - 11:15 AM | E10 Challenging Insider Threats: Cyberspace Insider Threat Triage (CITT) Plan | Management & Leadership |
10:25 AM - 11:15 AM | F10 Risky Business: Is Your Cybersecurity on Cruise Control | Privacy & Risk |
10:25 AM - 11:15 AM | G10 How to Implement the “Triangle” of Network Security Management | Infrastructure & Operations |
11:20 AM - 12:15 PM | Closing Keynote: CISO Perspectives: Developing A Cyber Strategy for Post Quarantine Return To Work | Keynotes |