InfoSec World 2021 Agenda

Saturday, September 24, 2022
9:00 AM - 3:00 PM (EDT)
9:00 AM - 3:00 PM
Zero Trust Summit
 
9:00 AM - 5:00 PM (EDT)
9:00 AM - 5:00 PM
Adversarial Attacks & Detection-Day 1 (HANDS ON)
 
Sunday, September 25, 2022
9:00 AM - 5:00 PM (EDT)
9:00 AM - 5:00 PM
Adversarial Attacks & Detection-Day 2 (HANDS ON)
 
9:00 AM - 5:00 PM
Leadership Summit: Your Path to CISO: How to Get to the C-Suite
 
1:15 PM - 5:30 PM (EDT)
1:15 PM - 5:30 PM
Ransomware Workshop
 
Monday, September 26, 2022
7:00 AM - 8:15 AM (EDT)
7:00 AM - 8:15 AM
Continental Breakfast
 
8:15 AM - 9:00 AM (EDT)
8:15 AM - 9:00 AM
Welcome & Opening Remarks/Are You Listening?! How to Get What You Want from Your CISO
 
9:00 AM - 9:15 AM (EDT)
9:00 AM - 9:15 AM
Why the US Government is Requiring Phishing-Resistant MFA and You Should Too
Identity, Authentication and Access Control
9:15 AM - 10:15 AM (EDT)
9:15 AM - 10:15 AM
Morning Break in Expo
 
9:15 AM - 6:30 PM (EDT)
9:15 AM - 6:30 PM
Expo Hall Open
 
9:30 AM - 9:45 AM (EDT)
9:30 AM - 9:45 AM
Axonius presents: Optimizing Security Operations Programs with Asset Intelligence
 
9:30 AM - 9:45 AM
Bionic presents: Using Application Architecture Mapping to Prevent Sensitive Data Exposure
 
9:55 AM - 10:10 AM (EDT)
9:55 AM - 10:10 AM
Perception Point presents: Security Blind Spots in the Era of Cloud Communication & Collaboration: Are You Protected?
 
9:55 AM - 10:10 AM
Progress Software presents: Zero Trust Case Study: It’s a Journey and Not a Task
 
10:15 AM - 11:05 AM (EDT)
10:15 AM - 11:05 AM
Betrayed by Their Browsers: How Security Teams Are Failing to Protect Users from 3rd Party Tracking and How to Stop It
Information Security Management
10:15 AM - 11:05 AM
Every Byte Counts: Practical controls for Software Supply Chain Security
Supply Chain Security
10:15 AM - 11:05 AM
Hacking Into A Cyber Career - True Stories
Information Security Careers
10:15 AM - 11:05 AM
Is Open Source Software (OSS) Too Open to Vulnerabilities? Cybersecurity Facts and Perceptions Considering Log4J
Application Security/Software Assurance
10:15 AM - 11:05 AM
Poisoning the Well : Ethics of Using Free Services Without Giving them Data
Privacy
10:15 AM - 11:05 AM
Strengthening Phishing Awareness Training Using NIST Phish Scale
Security Awareness
10:15 AM - 11:05 AM
The Metaverse: The Really Emerging Risk Landscape
Risk Mitigation
11:10 AM - 12:00 PM (EDT)
11:10 AM - 12:00 PM
As Risks to Our Personal Data Continue to Increase and Evolve, is the United States on Track to Finding a Solution?
Privacy
11:10 AM - 12:00 PM
A Whole Lotta BS (Behavioral Science) About Cybersecurity
Security Awareness
11:10 AM - 12:00 PM
Machine Learning: A Friend and Enemy of Cybersecurity
Security Automation
11:10 AM - 12:00 PM
Ten DevSecOps Culture Failures
DevSecOps
11:10 AM - 12:00 PM
The Many Colors of Cybersecurity
Workforce Diversity
11:10 AM - 12:00 PM
The Russian Cyber Threat
Threats
12:00 PM - 1:30 PM (EDT)
12:00 PM - 1:30 PM
Lunch in Expo
 
12:00 PM - 1:30 PM
Reduce Your Breach Risks and Cyber Insurance Premiums, hosted by ESET and Netsync (requires pre-registration)
 
12:45 PM - 1:00 PM (EDT)
12:45 PM - 1:00 PM
Cynet presents: Security Briefing--Putting Your Cybersecurity on Autopilot
 
12:45 PM - 1:00 PM
MEND presents: How to Build an Effective Open Source Security Program
 
1:10 PM - 1:25 PM (EDT)
1:10 PM - 1:25 PM
Malwarebytes presents: Threat Disruption: Securing 2022 from 2021
 
1:10 PM - 1:25 PM
Wib presents: Cautionary Tales: Real World Case Studies of API Blind Spots and Security Issues; How to Avoid Them
 
1:40 PM - 2:30 PM (EDT)
1:40 PM - 2:30 PM
Improving Cyber Defender Performance for Enhanced Enterprise Cybersecurity
Risk Mitigation
1:40 PM - 2:30 PM
Inspecting TLS
Network Security
1:40 PM - 2:30 PM
Understanding Vishing from the Attacker's Perspective
Threats
1:40 PM - 2:30 PM
Using DeTTECT and the MITRE ATT&CK Framework to Assess Your Security Posture
Network Security
1:40 PM - 2:30 PM
What Attorneys Can Do for Your Infosec Team
Governance, Regulation and Compliance
1:40 PM - 2:30 PM
Women in IT Security: Stop Plugging Holes and Start Feeding the Talent Pipeline
Workforce Diversity
2:35 PM - 3:25 PM (EDT)
2:35 PM - 3:25 PM
A CISO's Guide to the State of API Security
Application Security/Software Assurance
2:35 PM - 3:25 PM
Aligning Your Talents to Maximize Success in Your Infosec Career
Information Security Careers
2:35 PM - 3:25 PM
Deep Fakes - Evolving Threats to Enterprise Security
Cyber Crime
2:35 PM - 3:25 PM
Feed the Beast! Threat Hunt Use Cases from the Front Lines
Threats
2:35 PM - 3:25 PM
The Orlando Doctrine Ten Years Later - The Right to Cyber Self-Defense
Information Security Management
2:35 PM - 3:25 PM
What Cybersecurity Practitioners Can Learn from Honeybees
Zero Trust
2:35 PM - 3:25 PM
Where are Security Solutions Headed, and How do Cybersecurity Pros Navigate Through the Hype?
Information Security Management
3:30 PM - 4:00 PM (EDT)
3:30 PM - 4:00 PM
Afternoon Break in Expo
 
3:40 PM - 3:55 PM (EDT)
3:40 PM - 3:55 PM
Qualys presents:
 
3:40 PM - 3:55 PM
SGS presents: Conscientious Corporate Governance vs. the Orange Jumpsuit
 
4:00 PM - 4:25 PM (EDT)
4:00 PM - 4:25 PM
Better By Tomorrow: 7 Third-Party Risk Assessment Best Practices You Can Implement Today
Risk Mitigation
4:00 PM - 4:25 PM
Moving to Cloud-Native? Why Serverless App Security Needs to Be On Your Radar
Cloud Security
4:00 PM - 4:25 PM
Real Heroes Don’t Wear Capes: Managing Cyber Risk Against Unrealistic Expectations
Risk Mitigation
4:00 PM - 4:25 PM
Risk to Cloud Data is Lurking in the Shadows
Cloud Security
4:00 PM - 4:25 PM
Securing Your Digital Supply Chain in an Insecure Age
Supply Chain Security
4:00 PM - 4:25 PM
The Reason Why Ransomware is Really HEATing Up
Ransomware
4:00 PM - 4:25 PM
Zero Trust at the Endpoint
Zero Trust
4:30 PM - 5:00 PM (EDT)
4:30 PM - 5:00 PM
Cyberspace Operations Issues Emerging from Conflict in Ukraine and How They Impact Civilian Organizations
Threats
5:00 PM - 6:30 PM (EDT)
5:00 PM - 6:30 PM
Welcome Back Reception with Sponsors
 
5:30 PM - 5:45 PM (EDT)
5:30 PM - 5:45 PM
Checkmarx presents: Security at the Speed of APIs
 
5:30 PM - 5:45 PM
Security Journey presents: Reducing Vulnerabilities with Application Security Education
 
5:55 PM - 6:10 PM (EDT)
5:55 PM - 6:10 PM
cyberconIQ presents: Security Awareness Training That Just Works Better – Introducing the Human Defense Platform
 
5:55 PM - 6:10 PM
GuardDog presents: How to Create Successful Attack Surface Management Strategies across the Distributed Enterprise
 
Tuesday, September 27, 2022
6:30 AM - 7:15 AM (EDT)
6:30 AM - 7:15 AM
Morning Fun Run/Walk
 
7:30 AM - 8:15 AM (EDT)
7:30 AM - 8:15 AM
Continental Breakfast
 
7:30 AM - 8:15 AM
Email Security and Brand Protection: 2 Sides of the Same Coin, presented by Red Sift
 
7:30 AM - 8:15 AM
Key Ingredients for a Cyber Recovery Strategy, presented by Persistent Systems
 
8:15 AM - 9:15 AM (EDT)
8:15 AM - 9:15 AM
Opening Remarks and Fireside Chat with Robert Herjavec
 
9:15 AM - 10:15 AM (EDT)
9:15 AM - 10:15 AM
Morning Break in Expo
 
9:15 AM - 7:00 PM (EDT)
9:15 AM - 7:00 PM
Expo Hall Open
 
9:30 AM - 9:45 AM (EDT)
9:30 AM - 9:45 AM
GitGuardian presents: The Growing Problem of Secrets Sprawl--How 6 Million Secrets Were Leaked on GitHub and Its Implications
 
9:30 AM - 9:45 AM
RealVNC presents: Is Your Organization Vulnerable to Poor Remote Access Security?
 
9:55 AM - 10:10 AM (EDT)
9:55 AM - 10:10 AM
Sevco Security presents: Security Starts with Comprehensive Asset Intelligence
 
9:55 AM - 10:10 AM
Sysdig presents: Secure Your Cloud from Source to Run: Security for Containers, Kubernetes and Cloud
 
10:15 AM - 10:30 AM (EDT)
10:15 AM - 10:30 AM
Exterro presents: DFIR in a Remote Workforce Environment
 
10:15 AM - 11:05 AM (EDT)
10:15 AM - 11:05 AM
Cloud Security with AI Powered Threat Intelligence
Cloud Security
10:15 AM - 11:05 AM
Dealing with Post-COVID IT Security and Data Privacy Risks
Risk Mitigation
10:15 AM - 11:05 AM
Defining the Culture of your SOC
Leadership & Budgeting
10:15 AM - 11:05 AM
How 2020 Vision Has Blurred Attorney Client Privilege in Incident Response
Incident Response & Investigation
10:15 AM - 11:05 AM
Implementing Zero Trust Principles to Reduce Insider Risk
Zero Trust
10:15 AM - 11:05 AM
What Every Privacy Professional Should Know About Global Privacy Laws
Privacy
11:10 AM - 11:25 AM (EDT)
11:10 AM - 11:25 AM
Persistent Systems presents: Integrated Security Operations – An Effective Strategy to Combat Security Adversaries
 
11:10 AM - 12:00 PM (EDT)
11:10 AM - 12:00 PM
Adventures in Liability Coverage for Cybersecurity Breaches - Powered by AEHIS
Cyber Liability/Insurance
11:10 AM - 12:00 PM
Career Benefits of Cybersecurity Apprenticeships
Information Security Careers
11:10 AM - 12:00 PM
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Ransomware
11:10 AM - 12:00 PM
The Definition of Insanity: Stop Approaching Security Awareness the Same Way
Security Awareness
11:10 AM - 12:00 PM
The Towering Inferno: Why are APIs Short Circuiting our Security
Application Security/Software Assurance
11:10 AM - 12:00 PM
Vendor Risk Mitigation Strategies
Risk Mitigation
12:00 PM - 1:30 PM (EDT)
12:00 PM - 1:30 PM
Friend or Fraudster: Strategies and Tactics to Improve Conversion Rates and Prevent Fraud hosted by Kount (requires pre-registration)
 
12:00 PM - 1:30 PM
Lunch in Expo
 
12:00 PM - 1:30 PM
Securing Your Sensitive Assets in a Cloud-First World hosted by Cyral (requires pre-registration)
 
12:45 PM - 1:00 PM (EDT)
12:45 PM - 1:00 PM
ESET presents: How to Block Ransomware and Zero-Day Threats
 
12:45 PM - 1:00 PM
Synopsys presents: The Developer’s AppSec Wishlist: How to Build DevSecOps that Works
 
1:10 PM - 1:25 PM (EDT)
1:10 PM - 1:25 PM
Axiad presents: Enterprise-Wide Passwordless Orchestration: Overcoming Siloed Authentication Practices to Enhance Security and Lower User Friction
 
1:10 PM - 1:25 PM
Secure Code Warrior presents: Why Developers Need to Be Security Aware
 
1:40 PM - 2:30 PM (EDT)
1:40 PM - 2:30 PM
Cleaning up the Mess with the CyberMesh
Security Architecture/Engineering
1:40 PM - 2:30 PM
Cyber Insurance: Made Simple
Cyber Liability/Insurance
1:40 PM - 2:30 PM
SBoMs the Good, the Bad, The Ugly
Application Security/Software Assurance
1:40 PM - 2:30 PM
Security Questions to Ask Your Data Scientists
Security Automation
1:40 PM - 2:30 PM
The State of 2022 Cybersecurity Jobs
Information Security Careers
1:40 PM - 2:30 PM
The Time for Information Security Attorneys Is Now
Governance, Regulation and Compliance
1:40 PM - 2:30 PM
Verifiable Quantum Physics at the Foundation of Zero Trust: Securing Users, Devices, and Networks with Maximum Strength
Quantum Computing
2:35 PM - 3:25 PM (EDT)
2:35 PM - 3:25 PM
5 Ways to Increase Security Culture
Security Awareness
2:35 PM - 3:25 PM
A Secure Opensource Approach to Cloud Native Micro Segmentation
Cloud Security
2:35 PM - 3:25 PM
CyberTheft of Trade Secrets, and Attorneys’ Considerations during Data Breaches
Governance, Regulation and Compliance
2:35 PM - 3:25 PM
Malware 2021 to Present Day - Building a Preventative Cyber Program
Malware
2:35 PM - 3:25 PM
Ransomware: The Security Debt Collector
Ransomware
2:35 PM - 3:25 PM
"Those logs JUST aged off the server..."
Incident Response & Investigation
2:35 PM - 3:25 PM
Using The Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program
Threats
3:20 PM - 4:00 PM (EDT)
3:20 PM - 4:00 PM
Afternoon Break in Expo in Fiesta Foyer
 
4:00 PM - 4:25 PM (EDT)
4:00 PM - 4:25 PM
5 Fundamentals of Cloud Security
Cloud Security
4:00 PM - 4:25 PM
Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now
Zero Trust
4:00 PM - 4:25 PM
Death by a Thousand Telemetry Sources: How to Select (and Use) the Right Telemetry for Threat Detection and Response
Threats
4:00 PM - 4:25 PM
How to Evolve the SOC (Hint: You’re Doing it Wrong)
Security Operations
4:00 PM - 4:25 PM
Next-Generation Third-Party Risk Management: Aligning Cybersecurity & Third-Party Risk
Supply Chain Security
4:00 PM - 4:25 PM
Rethinking Vulnerability Management in the Cloud
Cloud Security
4:00 PM - 4:25 PM
Turning the Tables on Cyber-attackers With a Continuous AI Loop Approach
Security Automation
4:30 PM - 7:00 PM (EDT)
4:30 PM - 7:00 PM
Networking Reception + Passport to Prizes in Expo
 
Wednesday, September 28, 2022
7:30 AM - 8:15 AM (EDT)
7:30 AM - 8:15 AM
Continental Breakfast
 
8:15 AM - 8:30 AM (EDT)
8:15 AM - 8:30 AM
Opening Remarks - Wednesday
 
8:30 AM - 9:15 AM (EDT)
8:30 AM - 9:15 AM
Yesterday’s Cybersecurity Isn’t Good Enough
 
9:40 AM - 10:30 AM (EDT)
9:40 AM - 10:30 AM
Confessions of a CIA Spy – The Art of Human Hacking
Security Awareness
10:45 AM - 11:15 AM (EDT)
10:45 AM - 11:15 AM
A Day Out in Ukraine
 
11:15 AM - 11:30 AM (EDT)
11:15 AM - 11:30 AM
Closing Remarks