Three Rivers Information Security Symposium
  • About Us
  • Symposium
  • Registration
  • Scholarship Program
    • Scholarship Program Details
  • Contact Us
  • Past Events
    • 2019 Event
      • 2019 Sponsors
      • 2019 Schedule
    • 2018 Event
      • 2018 Sponsors
      • Facility & Parking
    • 2017 Event
      • Sponsors 2017
    • 2016 Event
      • 2016 Sponsors

2019 Schedule

Time Career Room Main Room Panel Room
8:30 am

Introductions and Kickoff

8:00 am

Registration and Breakfast

9:00 am

Building an IAM Program from Start to Finish

Jerod Brennen

When Refrigerators Attack – IoT Security

Kat Fitzgerald

Cyberterrorism: Evolution from Physical to Digital

Mackenzie Monarko
10:00 am

Break

10:15 am

Personal Data: Why and how do we protect it?

Pavithra Pradip and Harshal Shah

What is “Reasonable Security”? Understanding the Emerging Legal Standards

David G. Ries

Development Tools for Non-Developers: Kicking the Tires of DevSecOps

Josh Gilby
11:15 am

Talent Exfiltration – An Insider’s Guide To The Talent Attack Lifecycle

Mark Aiello

“S”ecurity Convergence for Cyber, Physical and Fraud

Susan Koski

Behind The Black Hoodie – Ethical Hacker Career Choices and Employment

David Kane
12:15 pm

Lunch

1:00 pm

Identity as the New Perimeter – Here’s How You Can Adapt and Protect Your Organization

Jack Nichelson

Always Connected, Always a Threat

Ray Richards and Eric Gumbert

CISO Panel

2:00 pm

Career Village

SESTA-FOSTA vs. Sex Tech

Alison Falk
3:00 pm

Break

3:15 pm

Career Village

Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes

Jack Freund, Ph.D.

“Paying it Forward” with Threat Intelligence

Katie Schwalen
4:15 pm

Wrap-up and Raffles

  • About Us
  • Symposium
  • Registration
  • Scholarship Program
  • Contact Us
  • Past Events
Hestia | Developed by ThemeIsle