This is the schedule with our invited speakers

 

Time  
7:00 - 8:15 Breakfast in Foyer Area
7:30 - 9:40 Attendee Registration
8:30 - 8:45 Welcome and Intro (ISSA chapters + Infragard)
8:45 - 9:30 Morning Keynote - Nathaniel Gleicher, Rooting Out Evil: Defend Your Data Center Like the Secret Service Protects the President
9:30 - 9:50 Break
  LAYERS 0-7:  PROTECTING THE TECHNOLOGIES OF THE ENTERPRISE LAYER 8:  THE INDIVIDUAL IN THE ENTERPRISE LAYER 9:  DEVELOPING SECURE PROCESSES FOR THE ENTERPRISE THE EXPANDING ENTERPRISE FROM IoT TO INDUSTRIAL CONTROL
9:50 - 10:45 Jennifer Mellone, Client Solutions Architect, Optiv:  Demystifying the Endpoint Protection Solutions Landscape Darnell Washington, President/CEO, SecureXperts - Data Manipulation and Digital Piracy:  What Does This Mean to You? Ted Heiman, Key Account Mgr., Venafi - Creating a Certificate Issuance Process that can be Enforced Enterprise-wide based on Your Global Security Policies. Gregory Enriquez, CEO, TrapX Security - Protecting IoT Devices on Internal Networks Using Deception Technology
10:45 - 11:00 Break
11:00 - 11:55 Rob Fry, Security Architect, StackRox - The Coming Wave of Containerization Anirban Banerjee, CEO and Founder, OnionID - Controlling Privilege Creep on SaaS and Cloud Infrastructure Shimon Modi, Dir. of Products and Technology, TruSTAR - Addressing Operational Blindspots with Intelligence Exchange Col. (Ret.) Lawrence Dietz, General Counsel & Managing Director, Information Security, Tal Global - Law of the Internet of Things
11:55 - 1:00 Lunch
12:50 - 1:30 Prize Drawing / Sponsor Hall
1:30 - 2:15 Afternoon Keynote - Susan E. Sons, NTP Under Attack
2:15 - 2:20 Break
2:20 - 3:00 Keynote Panel - Differing Viewpoints on IOT
3:00 - 3:20 Break
3:20 - 4:15 Paul Mockapetris, Chief Scientist, ThreatSTOP - Addresses are so ARPAnet:  Name-based Technologies are the Frontier of Security Patrick Huber - IT Change Management:  Taming the Cowboys and Cowgirls in the Wild West of IT Ron LaPedis, Global Enablement Specialist, MicroFocus - Linking Cyber Response to BCP Security Automation Panel: Sourabh Satish - Phantom, Rishi Bhargava - Demisto, Robi Papp - Avantgarde, Rob Fry - StackRox
4:15 - 4:30 Break
4:30 - 5:25 John Dickson, Principal, Denim Group - The DevOps Opportunity:  How to Capitalize to Radically Improve Security Kimberly Quan, Principal, KayQueue - Trust Violated:  Exploring Nefarious Acts from a Trusted Insider John Barchie, Practice Manager, OpenSky - The Practical Uses of the COBIT 5 Framework Robert Gebhard, Attorney and Partner, Sedgwick LLP - Navigating the Legal Landscape in Data Security:  Current Status and Emerging Trends in U.S. Law
5:25 - 5:30 Break
5:30 - 6:30 Reception and Prize Drawing
6:15 - 8:00 Evening Session
Derek Rook, SANS Institute - Teach an Organization to Phish: A Lesson in Offensive Awareness Techniques