• Tuesday, October 20
  • 2015 State of Vulnerability Exploits

    Amol Sarwate
    Tue, 10:15 - 11:15
    Theatre (Hall G) - Sponsors
  • The State of Software Security

    Chris Wysopal
    Tue, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • Changing the Game of Threat Hunting

    Jim Penrose
    Tue, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • One Ring to Rule Them All - Hardware isolation and the future of virtualization security

    Simon Crosby
    Tue, 14:40 - 15:40
    Theatre (Hall G) - Sponsors
  • Building Better Indicators: CrowdSourcing Malware IOCs

    Sean Wilson
    Tue, 15:55 - 16:55
    Theatre (Hall G) - Sponsors
  • Wednesday, October 21
  • Advanced Threats: Eliminating the Blind Spot

    Fahmy Kadiri
    Wed, 10:15 - 10:45
    Theatre (Hall G) - Sponsors
  • Ensuring the Success of Your IAM Project

    Jeremy Hanlon
    Wed, 10:45 - 11:15
    Theatre (Hall G) - Sponsors
  • Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured

    Sean Earhard
    Wed, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • Insider Threat – The Soft Underbelly of CyberSecurity

    Harold Byun
    Wed, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • Business Backed CVEs - The Major Vulnerabilities of the Past Year

    Brad Antoniewicz, Atif Ghauri
    Wed, 14:40 - 15:40
    Theatre (Hall G) - Sponsors