2015 Agenda-at-a
Transcription
2015 Agenda-at-a
AGENDA Tuesday May 12, 2015 7:30 AM Registration for Pre-Conference Workshops Opens 7:30 – 8:00 AM Continental Breakfast 8:00 AM to 4:00 PM Pre-Conference Workshops (Full-Day) 1. Cyber Warfare Training and Threat Simulation (Presented by Blackfin Security) 2. Introduction to Malware Analysis (Presented by KoreLogic Security) 3. Open FAIR Training (Presented by The Open Group and CXOWARE) 4. Emerging Issues in IT Auditing (Presented by Deloitte) 12:00 to 12:45 PM Lunch for Pre-Conference 1:00 to 4:00 PM Pre-Conference Workshop (Half-Day) Security Leadership Roundtable (Presented by Ernst & Young) 3:15 to 3:30 PM PM Break for Pre-Conference participants 4:15 to 5:15 PM Conference Opening Keynote Session – Featuring Brian Krebs 5:15 to 6:45 PM Welcome Reception in Exhibit Hall Wednesday May 13, 2015 7:00 AM Conference Registration Opens 7:00 to 8:00 AM Breakfast 8:00 to 9:15 AM Morning Keynote Session Featuring Eddie Mize 9:25 to 10:25 AM Workshops – Session One 101. The Quantitative Risk Management Process 102. Rescue Your Analytics From (un)Certain Doom 103. The Inception Framework: Cloud Based Targeted Attack Infrastructure 104. Cyber Plagues: An Approach to New Threats 105. Learning to Walk, Again 106. Windows PowerShell for the Power Auditor 10:25 to 11:15 AM Networking Break in Exhibit Hall 11:15 AM to 12:15 PM Workshops – Session Two 201. Using Service Supportability for IT Risk Management 202. You’re Under a Distributed Denial of Service Attack. Now What? 203. Malware/Threat Intel Analysis Lab Essentials 204. Honeypots for Active Defense 205. Colorado CISOs Speak – A Panel Discussion 206. There is a Crippling Cybersecurity Attack Coming Your Way! Can Effective Legislation Stop It? 12:30 to 1:15 PM Lunch 1:15 to 2:00 PM Dessert in Exhibit Hall 2:00 to 3:00 PM Workshops – Session Three 301. It Takes Sync to Make DR Go Right. It takes Layer 2 to Make It Out of Sight. 302. Implementing an Automated Incident Response Architecture 303. A Malware Developer’s Guide to Blocking an Attack 304. Hidden Trust, A Dark Web of Trust Relationships That Your Organization Doesn’t Know About 305. The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources 306. Moving to a Data Analytics Culture 307. Risk is What’s Left When Compliance Doesn’t Equal Security 3:15 to 4:15 PM Workshops – Session Four 401. SDN Security: Two Sides of the Same Coin 402. Performing Advanced Incident Response 403. Scaling Security in Agile Scrum 404. Automate or Die! How to Scale and Evolve to Fix Our Broken Industry 405. An (Over) Simplified Approach to Data Collection 406. FedRAMP: The New Baseline for Security and Compliance in the Cloud 4:30 to 5:30 PM Closing Keynote Session with Chris Nickerson, Reception and Prize Drawings