InfoSec World
The Event
About Us
Register for 2023
Agenda
Speakers
Venue
Pricing
Workshops
Sponsors
FAQ
About
Leadership Board
Media
InfoSec World
register
for 2023
Home
The Event
Agenda
Speakers
Venue
Pricing
Workshops
Sponsors
FAQ
About Us
About
Leadership Board
Media
Back to Top
Mon
Tue
Wed
All
Events
Keynotes
Topics
Formats
All Topics
Application Security/Software Assurance
Cloud Security
Cyber Crime
Cyber Liability/Insurance
DevSecOps
Governanace, Regulation and Compliance
Identity, Authentication and Access Control
Incident Response & Investigation
Information Security Careers
Information Security Management
Leadership & Budgeting
Malware
Network Security
Privacy
Quantum Computing
Ransomware
Risk Mitigation
Security Architecture/Engineering
Security Automation
Security Awareness
Security Operations
Supply Chain Security
Threats
Workforce Diversity
Zero Trust
All Formats
Keynote
Panel
Session
ALL
TIMES
6 AM
- 10 AM
10 AM
- 1 PM
1 PM
- 5 PM
5 PM
- End
No events available for this time.
Details >
7 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 9 am
Keynote
Welcome & Opening Remarks/Are You Listening?! How to Get What You Want from Your CISO
Tomás Maldonado
Chief Inforation Security Officer • National Football League (NFL)
Jill Aitoro
SVP, Content Strategy • CyberRisk Alliance
Maggie Amato
BISO • Salesforce
Identity, Authentication and Access Control
Details >
9 am - 9:15 am
Tech Spotlight
Identity, Authentication and Access Control
Why the US Government is Requiring Phishing-Resistant MFA and You Should Too
David Treece
Senior Director Solutions Architecture & Strategic Integrations • Yubico
Details >
9:15 am - 10:15 am
Break
Morning Break in Expo
Details >
9:15 am - 6:30 pm
Expo
Expo Hall Open
Details >
9:30 am - 9:45 am
Solutions Theater
Bionic presents: Using Application Architecture Mapping to Prevent Sensitive Data Exposure
Details >
9:30 am - 9:45 am
Solutions Theater
Axonius presents: Optimizing Security Operations Programs with Asset Intelligence
Details >
9:55 am - 10:10 am
Solutions Theater
Progress Software presents: Zero Trust Case Study: It’s a Journey and Not a Task
Details >
9:55 am - 10:10 am
Solutions Theater
Perception Point presents: Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected?
Information Security Management
Details >
10:15 am - 11:05 am
Session
Information Security Management
Betrayed by Their Browsers: How Security Teams Are Failing to Protect Users from 3rd Party Tracking and How to Stop It
Michael Landeck
Director of Security Consulting • NTT Data
Supply Chain Security
Details >
10:15 am - 11:05 am
Session
Supply Chain Security
Every Byte Counts: Practical controls for Software Supply Chain Security
Cassie Crossley
Director, Product & Systems Security • Schneider Electric
Application Security/Software Assurance
Details >
10:15 am - 11:05 am
Session
Application Security/Software Assurance
Is Open Source Software (OSS) Too Open to Vulnerabilities? Cybersecurity Facts and Perceptions Considering Log4J
Andrew Boyle
Director and Distinguished Digital & Cyber Technologist • Booz Allen Hamilton
Privacy
Details >
10:15 am - 11:05 am
Session
Privacy
Poisoning the Well : Ethics of Using Free Services Without Giving them Data
Brandon Dunlap
Senior Consultant • Brightfly
John Carnes
Senior Consultant • CxM Consulting
Security Awareness
Details >
10:15 am - 11:05 am
Session
Security Awareness
Strengthening Phishing Awareness Training Using NIST Phish Scale
Mani Keerthi Nagathu
IT Security Manager • Ballard Power Systems
Risk Mitigation
Details >
10:15 am - 11:05 am
Session
Risk Mitigation
The Metaverse: The Really Emerging Risk Landscape
Ira Winkler
Chief Security Architect • Walmart
Information Security Careers
Details >
10:15 am - 11:05 am
Session
Information Security Careers
Hacking Into A Cyber Career - True Stories
Mr Kris Rides
CEO • Tiro Security
Mrs. Heverin Joy Williams
Cloud Engineer • Sirius, a CDW company
Gunnar Kallstrom
CND Cyber Analyst • PeopleTec
Nick DeMeo
Jr. Security Administrator • Vista Clinical Diagnostics
Amanda Lyking
GRC Analyst/Infosec Project Manager • TBC
Threats
Details >
11:10 am - 12 pm
Session
Threats
The Russian Cyber Threat
Andrew Sekela
Special Agent • FBI Tampa
Workforce Diversity
Details >
11:10 am - 12 pm
Panel
Workforce Diversity
The Many Colors of Cybersecurity
Ed Adams
Board Director; CEO • Cyversity; Security Innovation
Trupti Shiralkar
Senior Security Engineering Manager, Product Security • Datadog
Sherron Burgess
Senior Vice President and CISO • BCD Travel
Kim Jones
Director, Security Operations • Intuit
Security Automation
Details >
11:10 am - 12 pm
Session
Security Automation
Machine Learning: A Friend and Enemy of Cybersecurity
Donnie Wendt
Principal Security Researcher • RiskRecon
Security Awareness
Details >
11:10 am - 12 pm
Session
Security Awareness
A Whole Lotta BS (Behavioral Science) About Cybersecurity
Lisa Plaggemier
Executive Director • National Cybersecurity Alliance
DevSecOps
Details >
11:10 am - 12 pm
Session
DevSecOps
Ten DevSecOps Culture Failures
Mr. Chris Romeo
CEO • Security Journey
Privacy
Details >
11:10 am - 12 pm
Session
Privacy
As Risks to Our Personal Data Continue to Increase and Evolve, is the United States on Track to Finding a Solution?
Brandon Pugh
Senior Feloow & Policy Counsel, Cubersecurity & Emerging Threats • R Street Institute
Cory Simpson
Senior Advisor • CSC 2.0
Details >
12 pm - 1:30 pm
Executive Luncheon
Reduce Your Breach Risks and Cyber Insurance Premiums, hosted by ESET and Netsync (requires pre-registration)
Details >
12 pm - 1:30 pm
Break
Lunch in Expo
Details >
12:45 pm - 1 pm
Solutions Theater
MEND presents: How to Build an Effective Open Source Security Program
Details >
12:45 pm - 1 pm
Solutions Theater
Cynet presents: Security Briefing--Putting Your Cybersecurity on Autopilot
Details >
1:10 pm - 1:25 pm
Solutions Theater
Wib presents: Cautionary Tales: Real World Case Studies of API Blind Spots and Security Issues; How to Avoid Them
Details >
1:10 pm - 1:25 pm
Solutions Theater
Malwarebytes presents: Threat Disruption: Securing 2022 from 2021
Governanace, Regulation and Compliance
Details >
1:40 pm - 2:30 pm
Session
Governanace, Regulation and Compliance
What Attorneys Can Do for Your Infosec Team
Mr. Scott Giordano Esq.
V.P., Corporate Privacy, and General Counsel • Spirion LLC
Jody R. Westby
CEO • Global Cyber Risk, LLC
Risk Mitigation
Details >
1:40 pm - 2:30 pm
Panel
Risk Mitigation
Improving Cyber Defender Performance for Enhanced Enterprise Cybersecurity
Jeff Greer
Lecturer, Cybersecurity • University of North Carolina Wilmington
Geoff Stoker
Assistant Professor • University of North Carolina Wilmington
Dr. Ulku Clark
Professor • University of North Carolina Wilmington
Network Security
Details >
1:40 pm - 2:30 pm
Session
Network Security
Using DeTTECT and the MITRE ATT&CK Framework to Assess Your Security Posture
Claude Branscome
Global Partner Solutions Security Architect • Microsoft
Threats
Details >
1:40 pm - 2:30 pm
Session
Threats
Understanding Vishing from the Attacker's Perspective
Shelby Dacko
Human Risk Analyst • Social-Engineer LLC
Network Security
Details >
1:40 pm - 2:30 pm
Session
Network Security
Inspecting TLS
Frans Schippers
Lecturer Cyber Security, HBO-ICT/Cyber Security • Amsterdam University of Applied Sciences
Workforce Diversity
Details >
1:40 pm - 2:30 pm
Session
Workforce Diversity
Women in IT Security: Stop Plugging Holes and Start Feeding the Talent Pipeline
Mani Keerthi Nagathu
IT Security Manager • Ballard Power Systems
Gaylynn Fassler
Information Security Analyst, Strategic Projects Lead • Duke Health
Shelly Epps
Director, Security Program Management • Duke Health
Jill Aitoro
SVP, Content Strategy • CyberRisk Alliance
Information Security Management
Details >
2:35 pm - 3:25 pm
Session
Information Security Management
Where are Security Solutions Headed, and How do Cybersecurity Pros Navigate Through the Hype?
Ms. Candy Alexander
ISSA International President • ISSA
Information Security Management
Details >
2:35 pm - 3:25 pm
Session
Information Security Management
The Orlando Doctrine Ten Years Later - The Right to Cyber Self-Defense
Brandon Dunlap
Senior Consultant • Brightfly
Spencer Wilcox
Senior Director, Cybersecurity & Technology Risk • NextEra Energy, Inc.
Application Security/Software Assurance
Details >
2:35 pm - 3:25 pm
Session
Application Security/Software Assurance
A CISO's Guide to the State of API Security
Richard Tychansky
Security Architect •
Information Security Careers
Details >
2:35 pm - 3:25 pm
Session
Information Security Careers
Aligning Your Talents to Maximize Success in Your Infosec Career
Gaylynn Fassler
Information Security Analyst, Strategic Projects Lead • Duke Health
Shelly Epps
Director, Security Program Management • Duke Health
Zero Trust
Details >
2:35 pm - 3:25 pm
Session
Zero Trust
What Cybersecurity Practitioners Can Learn from Honeybees
Gianna Whitver
Founder • LeaseHoney
Dan Watson
Consultant • Microsoft
Threats
Details >
2:35 pm - 3:25 pm
Session
Threats
Feed the Beast! Threat Hunt Use Cases from the Front Lines
Mr. Max Moerles
Senior Lead Technologist • Booz Allen Hamilton
Brittany Sattler
Threat Hunter • Booz Allen Hamilton
Cyber Crime
Details >
2:35 pm - 3:25 pm
Session
Cyber Crime
Deep Fakes - Evolving Threats to Enterprise Security
Peter Warmka
Founder • Counterintelligence Institute, LLC
Details >
3:30 pm - 4 pm
Break
Afternoon Break in Expo
Details >
3:40 pm - 3:55 pm
Solutions Theater
SGS presents: Conscientious Corporate Governance vs. the Orange Jumpsuit
Details >
3:40 pm - 3:55 pm
Solutions Theater
Qualys presents:
Risk Mitigation
Details >
4 pm - 4:25 pm
Session
Risk Mitigation
Better By Tomorrow: 7 Third-Party Risk Assessment Best Practices You Can Implement Today
Jason Sabourin
Director of Product Management • OneTrust
Zero Trust
Details >
4 pm - 4:25 pm
Session
Zero Trust
Zero Trust at the Endpoint
Danny Jenkins
CEO & Co-Founder • ThreatLocker
Risk Mitigation
Details >
4 pm - 4:25 pm
Session
Risk Mitigation
Real Heroes Don’t Wear Capes: Managing Cyber Risk Against Unrealistic Expectations
Tia Hopkins
Field CTO & Chief Cyber Risk Strategist • eSentire
Rich Raether
Chief Information Officer • Quarles & Brady LLP
Ransomware
Details >
4 pm - 4:25 pm
Session
Ransomware
The Reason Why Ransomware is Really HEATing Up
Neko Papez
Senior Manager, Cybersecurity Strategy • Menlo Security
Supply Chain Security
Details >
4 pm - 4:25 pm
Session
Supply Chain Security
Securing Your Digital Supply Chain in an Insecure Age
John Chisum
Vice President, Solutions Consulting • RiskRecon
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
Risk to Cloud Data is Lurking in the Shadows
Andy Smith
CMO • Laminar
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
Moving to Cloud-Native? Why Serverless App Security Needs to Be On Your Radar
Mike Khusid
Senior Director, Product Management • Contrast Security
Threats
Details >
4:30 pm - 5 pm
Session
Threats
Cyberspace Operations Issues Emerging from Conflict in Ukraine and How They Impact Civilian Organizations
Kurt Sanger
Deputy General Counsel • US Cyber Command
Details >
5 pm - 6:30 pm
Networking
Welcome Back Reception with Sponsors
Details >
5:30 pm - 5:45 pm
Solutions Theater
Checkmarx presents: Security at the Speed of APIs
Details >
5:30 pm - 5:45 pm
Solutions Theater
Security Journey presents: Reducing Vulnerabilities with Application Security Education
Details >
5:55 pm - 6:10 pm
Solutions Theater
GuardDog presents: How to Create Successful Attack Surface Management Strategies across the Distributed Enterprise
Details >
5:55 pm - 6:10 pm
Solutions Theater
cyberconIQ presents: Security Awareness Training That Just Works Better – Introducing the Human Defense Platform
Details >
6:30 am - 7:15 am
Networking
Morning Fun Run/Walk
Details >
7:30 am - 8:15 am
Power Breakfast
Email Security and Brand Protection: 2 Sides of the Same Coin, presented by Red Sift
Details >
7:30 am - 8:15 am
Power Breakfast
Key Ingredients for a Cyber Recovery Strategy, presented by Persistent Systems
Details >
7:30 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 9:15 am
Keynote
Opening Remarks and Fireside Chat with Robert Herjavec
Robert Herjavec
CEO • Cyderes
Jill Aitoro
SVP, Content Strategy • CyberRisk Alliance
Details >
9:15 am - 7 pm
Expo
Expo Hall Open
Details >
9:15 am - 10:15 am
Break
Morning Break in Expo
Details >
9:30 am - 9:45 am
Solutions Theater
RealVNC presents: Is Your Organization Vulnerable to Poor Remote Access Security?
Details >
9:30 am - 9:45 am
Solutions Theater
GitGuardian presents: The Growing Problem of Secrets Sprawl--How 6 Million Secrets Were Leaked on GitHub and Its Implications
Details >
9:55 am - 10:10 am
Solutions Theater
Sevco Security presents: Security Starts with Comprehensive Asset Intelligence
Details >
9:55 am - 10:10 am
Solutions Theater
Sysdig presents: Secure Your Cloud from Source to Run: Security for Containers, Kubernetes and Cloud
Zero Trust
Details >
10:15 am - 11:05 am
Session
Zero Trust
Implementing Zero Trust Principles to Reduce Insider Risk
Mr. Randy Trzeciak
Technical Director • Carnegie Mellon University Software Engineering Institute
Incident Response & Investigation
Details >
10:15 am - 11:05 am
Session
Incident Response & Investigation
How 2020 Vision Has Blurred Attorney Client Privilege in Incident Response
Brandon Dunlap
Senior Consultant • Brightfly
Andrea Hoy
President, vCISO and CEO, Co-Founder, Chief Disruptor • A Hoy & Associates
Ron Raether
Partner, Attorney at Law • Troutman (Troutman Pepper Sanders Hamilton)
Privacy
Details >
10:15 am - 11:05 am
Session
Privacy
What Every Privacy Professional Should Know About Global Privacy Laws
Adriana Sanford
Senior Fellow- Global Privacy • Claremont Graduate University
Cloud Security
Details >
10:15 am - 11:05 am
Session
Cloud Security
Cloud Security with AI Powered Threat Intelligence
Mr Oluyemi James Odeyinka
Technical Architect & Cybersecurity Leader • Walgreens Co.
Risk Mitigation
Details >
10:15 am - 11:05 am
Session
Risk Mitigation
Dealing with Post-COVID IT Security and Data Privacy Risks
Ralph Villanueva
IT Security and Compliance Analyst • Hilton Grand Vacation
Leadership & Budgeting
Details >
10:15 am - 11:05 am
Session
Leadership & Budgeting
Defining the Culture of your SOC
Jordan Silva
Senior Manager, Service Delivery • Hawaiian Telcom
Details >
10:15 am - 10:30 am
Solutions Theater
Exterro presents: DFIR in a Remote Workforce Environment
Cyber Liability/Insurance
Details >
11:10 am - 12 pm
Session
Cyber Liability/Insurance
Adventures in Liability Coverage for Cybersecurity Breaches - Powered by AEHIS
Lynn Sessions
Lead, BakerHostetler Healthcare Privacy & Compliance Team, Digital Assets & Data Management Group • BakerHostetler
Details >
11:10 am - 11:25 am
Solutions Theater
Persistent Systems presents: Integrated Security Operations – An Effective Strategy to Combat Security Adversaries
Ransomware
Details >
11:10 am - 12 pm
Session
Ransomware
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Joseph Carson
Chief Security Scientist & Advisory CISO • Delinea
Application Security/Software Assurance
Details >
11:10 am - 12 pm
Session
Application Security/Software Assurance
The Towering Inferno: Why are APIs Short Circuiting our Security
Kevin Johnson
CEO • Secure Ideas
Information Security Careers
Details >
11:10 am - 12 pm
Panel
Information Security Careers
Career Benefits of Cybersecurity Apprenticeships
Brandon Dunlap
Senior Consultant • Brightfly
Rodney McLeod
CEO • McLeod Information Systems
Kimberly Hauge
Workforce Analyst • Department of Labor
Kelly Vedi
Senior Policy Analyst • New America
Risk Mitigation
Details >
11:10 am - 12 pm
Session
Risk Mitigation
Vendor Risk Mitigation Strategies
Jaret Preston
Vendor Risk Manager • Caterpillar
Security Awareness
Details >
11:10 am - 12 pm
Session
Security Awareness
The Definition of Insanity: Stop Approaching Security Awareness the Same Way
Mindy Baird
Information Security Risk Specialist II • Western & Southern Financial Group
Details >
12 pm - 1:30 pm
Executive Luncheon
Securing Your Sensitive Assets in a Cloud-First World hosted by Cyral (requires pre-registration)
Details >
12 pm - 1:30 pm
Executive Luncheon
Friend or Fraudster: Strategies and Tactics to Improve Conversion Rates and Prevent Fraud hosted by Kount (requires pre-registration)
Details >
12 pm - 1:30 pm
Break
Lunch in Expo
Details >
12:45 pm - 1 pm
Solutions Theater
Synopsys presents: The Developer’s AppSec Wishlist: How to Build DevSecOps that Works
Details >
12:45 pm - 1 pm
Solutions Theater
ESET presents: How to Block Ransomware and Zero-Day Threats
Details >
1:10 pm - 1:25 pm
Solutions Theater
Secure Code Warrior presents: Why Developers Need to Be Security Aware
Details >
1:10 pm - 1:25 pm
Solutions Theater
Axiad presents: Enterprise-Wide Passwordless Orchestration: Overcoming Siloed Authentication Practices to Enhance Security and Lower User Friction
Security Automation
Details >
1:40 pm - 2:30 pm
Session
Security Automation
Security Questions to Ask Your Data Scientists
Dr. Thomas Scanlon
Technical Program Manager - CERT Data Science • Carnegie Mellon University Software Engineering Institute
Cyber Liability/Insurance
Details >
1:40 pm - 2:30 pm
Session
Cyber Liability/Insurance
Cyber Insurance: Made Simple
Joseph Brunsman
Founder • Brunsman Advisory Group
Quantum Computing
Details >
1:40 pm - 2:30 pm
Session
Quantum Computing
Verifiable Quantum Physics at the Foundation of Zero Trust: Securing Users, Devices, and Networks with Maximum Strength
Duncan Jones
Head of Quantum Cybersecurity • Quantinuum
Application Security/Software Assurance
Details >
1:40 pm - 2:30 pm
Session
Application Security/Software Assurance
SBoMs the Good, the Bad, The Ugly
Michael Angelo
Chief Security Architect • Micro Focus International
Security Architecture/Engineering
Details >
1:40 pm - 2:30 pm
Session
Security Architecture/Engineering
Cleaning up the Mess with the CyberMesh
"Chip" D.B. Wagner
QRadar XDR Leader • IBM
Governanace, Regulation and Compliance
Details >
1:40 pm - 2:30 pm
Session
Governanace, Regulation and Compliance
The Time for Information Security Attorneys Is Now
Mr. Scott Giordano Esq.
V.P., Corporate Privacy, and General Counsel • Spirion LLC
Jody R. Westby
CEO • Global Cyber Risk, LLC
Information Security Careers
Details >
1:40 pm - 2:30 pm
Session
Information Security Careers
The State of 2022 Cybersecurity Jobs
Deidre Diamond
CEO and Founder • CyberSN
Malware
Details >
2:35 pm - 3:25 pm
Session
Malware
Malware 2021 to Present Day - Building a Preventative Cyber Program
Grant Asplund
Growth Technologies Evangelist • Check Point Software Technologies
Ransomware
Details >
2:35 pm - 3:25 pm
Session
Ransomware
Ransomware: The Security Debt Collector
Dave Lewis
Advisory CISO • Cisco Systems
Cloud Security
Details >
2:35 pm - 3:25 pm
Session
Cloud Security
A Secure Opensource Approach to Cloud Native Micro Segmentation
Partha Charkraborty
Associate Vice President - Cloud Security and Cyber Innovation • Humana Inc.
Security Awareness
Details >
2:35 pm - 3:25 pm
Session
Security Awareness
5 Ways to Increase Security Culture
James McQuiggan
Security Awareness Advocate • KnowBe4
Incident Response & Investigation
Details >
2:35 pm - 3:25 pm
Session
Incident Response & Investigation
"Those logs JUST aged off the server..."
Matthew Harvey
Director of Incident Response • Crowdstrike
Threats
Details >
2:35 pm - 3:25 pm
Session
Threats
Using The Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program
Mr. Chris Romeo
CEO • Security Journey
Governanace, Regulation and Compliance
Details >
2:35 pm - 3:25 pm
Session
Governanace, Regulation and Compliance
CyberTheft of Trade Secrets, and Attorneys’ Considerations during Data Breaches
Herbert Joe
Reg. Patent Attorney/Board Certified Forensic Examiner • Law Office of Herbert Joe
Details >
3:20 pm - 4 pm
Break
Afternoon Break in Expo in Fiesta Foyer
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
5 Fundamentals of Cloud Security
Anthony Seto
Field Strategist • Snyk
Security Automation
Details >
4 pm - 4:25 pm
Session
Security Automation
Turning the Tables on Cyber-attackers With a Continuous AI Loop Approach
Justin Fier
VP, Tactical Risk and Response • Darktrace
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
Rethinking Vulnerability Management in the Cloud
Will LaRiccia
Sr. Security Manager, Detection, Intelligence & Response • Amazon
Supply Chain Security
Details >
4 pm - 4:25 pm
Session
Supply Chain Security
Next-Generation Third-Party Risk Management: Aligning Cybersecurity & Third-Party Risk
MR DAVID KLEIN
Sr. Director of Product Strategy • ProcessUnity
Zero Trust
Details >
4 pm - 4:25 pm
Session
Zero Trust
Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now
Chad Koslow
CEO • Ridge IT Corporation
Security Operations
Details >
4 pm - 4:25 pm
Session
Security Operations
How to Evolve the SOC (Hint: You’re Doing it Wrong)
Todd Gaiser
Vice President, Customer Security Operations • Red Canary
Threats
Details >
4 pm - 4:25 pm
Session
Threats
Death by a Thousand Telemetry Sources: How to Select (and Use) the Right Telemetry for Threat Detection and Response
Lauren Horaist
Senior Director, Product Management, Sophos Security Operations • Sophos Inc.
Details >
4:30 pm - 7 pm
Networking
Networking Reception + Passport to Prizes in Expo
Details >
7:30 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 8:30 am
Session
Opening Remarks - Wednesday
Details >
8:30 am - 9:15 am
Keynote
Yesterday’s Cybersecurity Isn’t Good Enough
Parham Eftekhari
Executive Vice President, CISO Communities • CyberRisk Alliance
Gregory Touhill
Director, CERT Division • Carnegie Mellon University Software Engineering Institute
Security Awareness
Details >
9:40 am - 10:30 am
Session
Security Awareness
Confessions of a CIA Spy – The Art of Human Hacking
Peter Warmka
Founder • Counterintelligence Institute, LLC
Details >
10:45 am - 11:15 am
Keynote
A Day Out in Ukraine
Andrew Smeaton
CISO • Afiniti
Details >
11:15 am - 11:30 am
Session
Closing Remarks
Details >
1 pm - 5 pm
Workshop
Data Science for Cybersecurity (HANDS ON)
Dr. Thomas Scanlon
Technical Program Manager - CERT Data Science • Carnegie Mellon University Software Engineering Institute
Details >
1 pm - 5 pm
Workshop
Advanced Cubicles & Compromises (HANDS ON)
Ean Meyer
Associate Director-Security Assurance • Marriott Vacations Worldwide
Details >
1 pm - 5 pm
Workshop
Cloud Native Application Architecture Threat Hunting
Richard Tychansky
Security Architect •
Details >
1 pm - 5 pm
Workshop
The Benefits of Deploying a Zero Trust Network Access Architecture (HANDS ON)
Matt Schiller
Senior Software Engineer • Banyan Security
For any and all inquiries please click the button below
Contact Us Today
Tim Garon
Director, Event Content and Strategy
Get in touch with Tim
Join our mailing list for the latest news on InfoSec World 2023.
Keep me updated