Main Room
Registration and Breakfast
Introductions and Kickoff
Career Room
Jerod Brennen
Building an IAM Program from Start to Finish
Kat Fitzgerald
When Refrigerators Attack – IoT Security
Panel Room
Mackenzie Monarko
Cyberterrorism: Evolution from Physical to Digital
Break
Pavithra Pradip and Harshal Shah
Personal Data: Why and how do we protect it?
David G. Ries
What is “Reasonable Security”? Understanding the Emerging Legal Standards
Josh Gilby
Development Tools for Non-Developers: Kicking the Tires of DevSecOps
Mark Aiello
Talent Exfiltration – An Insider’s Guide To The Talent Attack Lifecycle
Susan Koski
“S”ecurity Convergence for Cyber, Physical and Fraud
David Kane
Behind The Black Hoodie – Ethical Hacker Career Choices and Employment
Lunch
Jack Nichelson
Identity as the New Perimeter – Here’s How You Can Adapt and Protect Your Organization
Ray Richards and Eric Gumbert
Always Connected, Always a Threat
CISO Panel
Career Village
Alison Falk
SESTA-FOSTA vs. Sex Tech
Jack Freund, Ph.D.
Communicating Technology Risk to Non-Tech People: Helping Organizations Understand Bad Outcomes
Katie Schwalen
“Paying it Forward” with Threat Intelligence
Wrap-up and Raffles