This is the schedule for COT 2018 including our keynotes and track speakers

Time  
7:00 - 8:15 Breakfast in Foyer Area
7:30 - 8:30 Attendee Registration
8:30 - 8:45 Welcome and Intro (ISSA chapters + Infragard)
8:45 - 9:30 Morning Keynote - Peter Wicher - Singularity University
9:30 - 9:45 Break
  PROTECTING ENTERPRISE TECHNOLOGIES IN AN AGE OF DISRUPTION THE INDIVIDUAL IN AN AGE OF DISRUPTION DEVELOPING SECURE PROCESSES IN AN AGE OF DISRUPTION THE FUTURE IS CHAOS
9:45 - 10:40 Ali Golshan, Co-Founder and CTO, StackRox - Container and Cloud-Native Architectures: The Modern-day Labyrinth Laura Louthan, Founder, Angel Cybersecurity – Incident Management in the Age of Disruption. Mark S. Kadrich, Kadrich InfoSec Consulting Services - Preparing for Disruption: Building a Predictable and Survivable Security Architecture Charles Cresson Wood, Attorney & Management Consultant, InfoSecurity Infrastructure, Inc. - Why the Current U.S. Legal and Regulatory Regime for Information Security and Privacy Doesn't Work, and Can't Be Made to Work
10:40 - 10:50 Break
10:50 - 11:45 Glenn Kesselman, President, Kesselman & Associates - Industrial Internet of Things - Opportunities and Challenges in the Age of Disruption Anshu Gupta, CISO, Golden Gate Cyber - Data Exfiltration Techniques: What do You Need to Know? Matt Alderman, Chief Strategy & Marketing Officer, Layered Insight - Unify DevOps and SecOps: Security without Friction Ulrich Lang, CEO ObjectSecurity - Cybersecurity and Artificial Intelligence: Let's Cut through the Hype
11:45 - 1:00 Lunch
12:10 - 12:40 Women in Security Lunch Address - Launa Rich, Managing Director at CyberSN, Ambassador at Brainbabe - Hack Your EQ: Grow Your Career
12:50 - 1:30 Prize Drawing / Sponsor Hall
1:30 - 2:15 Afternoon Keynote - Rick Howard - CSO, Palo Alto Networks
2:15 - 2:20 Break
2:20 - 3:00 Keynote Panel - Blockchain: Boom or Bust, a panel discussion on the pros and cons of blockchain technology
3:00 - 3:10 Break
3:10 - 4:00 Matthew Gast, Director of Product, tCell.io - Cryptojacking: Preventing Attackers from Stealing Your Computers for Profit Leo Meyerovich, CEO, Graphistry - Changing Who Writes the Queries: High-Leverage Incident Response with Visual Playbooks and Visual Graph Analysis Stuart Cianos, Security Architect, Medallia - Tools that Enable DevSecOps Andy Liverman-Anderson - Looking Beyond the Voting Machines: Practical Strategies to Secure our Election Systems.
4:00 - 4:10 Break
4:10 - 5:00   Michael Marriott - Fake News: More than just a Catchy Headline and Why Businesses Should be Concerned.   Matt Trentler, Senior Security Architect – Amazon Web Services (AWS) - Cultural Disruptions: How the Cloud is Changing Company Culture (PANEL)
5:00 - 5:45 Reception and Prize Drawing
5:30 - 6:15 Students in Security