• 08:50
  • Opening Remarks, day 2

    Brian Bourne
    Wed, 08:50 - 09:00
    Keynote Hall - Keynote
  • 09:00
  • Security is Essential to Privacy - But is not enough ... Enter Privacy by Design

    Dr. Ann Cavoukian
    Wed, 09:00 - 10:00
    Keynote Hall - Keynote
  • 10:15
  • DevOps For The Home

    Kellman Meghu
    Wed, 10:15 - 11:15
    701A - Tech
  • Stealthier Attacks and Smarter Defending with TLS Fingerprinting

    Lee Brotherston
    Wed, 10:15 - 11:15
    801A - Tech
  • Hijacking Arbitrary .NET Application Control Flow

    Topher Timzen
    Wed, 10:15 - 11:15
    801B - Tech
  • Dolla Dolla Bill Y’all: Cybercrime Cashouts

    Benjamin Brown
    Wed, 10:15 - 11:15
    701B - Management
  • Ground Zero Financial Services: Targeted Attacks from the Darknet

    Joe Pizzo
    Wed, 10:15 - 11:15
    803 - Security Fundamentals
  • Advanced Threats: Eliminating the Blind Spot

    Fahmy Kadiri
    Wed, 10:15 - 10:45
    Theatre (Hall G) - Sponsors
  • 10:45
  • Ensuring the Success of Your IAM Project

    Jeremy Hanlon
    Wed, 10:45 - 11:15
    Theatre (Hall G) - Sponsors
  • 11:30
  • Knowing what happened is only half the battle.

    Grayson Lenik
    Wed, 11:30 - 12:00
    701A - Sponsors
  • SIEM and the Art of Log Management

    Ron Pettit, Jeff Pold
    Wed, 11:30 - 12:00
    801A - Sponsors
  • Effective Ways to Tackle Vulnerability Remediation

    Dave Millier
    Wed, 11:30 - 12:00
    801B - Sponsors
  • The Internet of Bad Things and Securing the Software Defined Data Center

    Marc Edun, Ian Redden
    Wed, 11:30 - 12:00
    701B
  • Certifi-gate: Has your Android device been Pwned?

    Shai Yanovski
    Wed, 11:30 - 12:00
    803 - Sponsors
  • Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured

    Sean Earhard
    Wed, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • 12:00
  • Maturing InfoSec: Lessons from Aviation on Information Sharing

    Trey Ford
    Wed, 12:00 - 13:10
    Keynote Hall - Keynote
  • 13:25
  • What Google knows about you and your devices, and how to get it

    Vladimir Katalov
    Wed, 13:25 - 14:25
    701A - Tech
  • Software Defined Networking / Attacker Defined Networking

    Rob VandenBrink
    Wed, 13:25 - 14:25
    801A - Tech
  • Breaking and Fixing Python Applications

    Enrico Branca
    Wed, 13:25 - 14:25
    801B - Tech
  • Bulletproofing Your Incident Response Plan: Effective Tabletops

    Reg Harnish
    Wed, 13:25 - 14:25
    701B - Management
  • Preventing Home Automation Security Disasters

    James Arlen
    Wed, 13:25 - 14:25
    803 - Security Fundamentals
  • Insider Threat – The Soft Underbelly of CyberSecurity

    Harold Byun
    Wed, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • 14:40
  • Cymon - An Open Threat Intelligence System

    Roy Firestein
    Wed, 14:40 - 15:40
    701A - Tech
  • Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities

    James Arlen, Brendan O’Connor
    Wed, 14:40 - 15:40
    801A - Tech
  • Learning To Love Your Attackers

    Ryan Linn
    Wed, 14:40 - 15:40
    801B - Tech
  • The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight!

    Bob DuCharme
    Wed, 14:40 - 15:40
    701B - Management
  • Agile Incident Management - Bringing the “Win” Back to Data and Privacy Breach Responses

    Robert Beggs
    Wed, 14:40 - 15:40
    803 - Security Fundamentals
  • Business Backed CVEs - The Major Vulnerabilities of the Past Year

    Brad Antoniewicz, Atif Ghauri
    Wed, 14:40 - 15:40
    Theatre (Hall G) - Sponsors
  • 15:40
  • Closing Remarks

     
    Wed, 15:40 - 15:50
    Keynote Hall - Keynote