Skip to main content
Register
Browse Schedule
Browse By Date
Saturday, September 23, 2017
Sunday, September 24, 2017
Monday, September 25, 2017
Tuesday, September 26, 2017
Wednesday, September 27, 2017
Browse by Tracks
Browse By Speakers
Browse by Session Type
Events & Sessions
Keynotes
CSA Summit
Conference Agenda
Panoply
Solutions Theater
Americas ISLA
Member Events
Hotel & Travel
Exhibits & Sponsors
Exhibitor List
Sponsors
Exhibitor Floor
Become a Sponsor
My Schedule
Login required
Surveys/Evals
Login required
Conference App
Login
Toggle navigation
Home
Register
Browse Schedule
Browse By Date
Saturday, September 23, 2017
Sunday, September 24, 2017
Monday, September 25, 2017
Tuesday, September 26, 2017
Wednesday, September 27, 2017
Browse by Tracks
Browse By Speakers
Browse by Session Type
Events & Sessions
Keynotes
CSA Summit
Conference Agenda
Panoply
Solutions Theater
Americas ISLA
Member Events
Hotel & Travel
Exhibits & Sponsors
Exhibitor List
Sponsors
Exhibitor Floor
Become a Sponsor
My Schedule
Login required
Surveys/Evals
Login required
Conference App
Browse by Tracks
Browse by Tracks
0
results found.
Type here to filter the list
Application Security/Software Assurance
Monday, 9:45 am
4116 - Reducing Software Vulnerabilities – The 'Vital Few' Process and Product Metrics
Location: Floor 3: Salon G
Monday, 10:00 am
3110 - Security White Belt Workshop
Location: Room 201
Monday, 11:00 am
4216 - Planes, Trains, and...Why Your Code Don't Cut It!
Location: Floor 3: Salon G
Monday, 3:15 pm
4316 - Solving Cybersecurity Skills Shortage with Apprenticeships and Certifications
Location: Floor 3: Salon G
Monday, 4:30 pm
4416 - Crowdsourced Security: The Good, The Bad and The Ugly
Location: Floor 3: Salon G
Tuesday, 10:30 am
5116 - From DevOoooops to DevOps
Location: Floor 3: Salon G
Tuesday, 1:45 pm
5216 - Decision-making Factors in Software Testing Tool Selection
Location: Floor 3: Salon G
Tuesday, 3:00 pm
5316 - How to Implement the Eight Most Effective Secure Development Practices in Use Today
Location: Floor 3: Salon G
Tuesday, 4:15 pm
5416 - Secure Applications, Not the Cloud
Location: Floor 3: Salon G
Wednesday, 10:00 am
3311 - Security White Belt Workshop
Location: Room 201
Cloud Security
Monday, 9:45 am
4110 - Incident Response in the Azure Cloud
Location: Floor 3: Salon A
Monday, 11:00 am
4210 - Cloud Security at Chevron: the Journey from Discovery to Secure Adoption
Location: Floor 3: Salon A
Monday, 3:15 pm
4310 - Investing Beyond the Firewall: Buying Security To, From and In the Cloud
Location: Floor 3: Salon A
Monday, 4:30 pm
4410 - 10 Reasons Why Micro-Segmentation and Clouds are Not Secure
Location: Floor 3: Salon A
Tuesday, 10:30 am
5110 - Are You Playing Chess or Checkers with Your Cloud Security Posture?
Location: Floor 3: Salon A
Tuesday, 1:45 pm
5210 - Security Considerations for Designing a Cloud Solution with Google Cloud Platform
Location: Floor 3: Salon A
Tuesday, 3:00 pm
5310 - Optimizing Endpoint Security for Cloud-centric Infrastructures
Location: Floor 3: Salon A
Tuesday, 4:15 pm
5410 - Automating Security in the Cloud – Modernizing Technology Governance
Location: Floor 3: Salon A
Wednesday, 8:00 am
2210 - From 10% Cloud to 100% Cloud in 3 Years - How (ISC)² is Doing it and Putting Security First
Location: Floor 3: Salon A
Wednesday, 9:00 am
6110 - Cyber Insurance in the Cloud
Location: Floor 3: Salon A
Wednesday, 10:15 am
6210 - Do Containers Fully 'Contain' Security Issues? A Closer Look at Garden and Docker.
Location: Floor 3: Salon A
Wednesday, 1:00 pm
6310 - Mitigating Authorization Challenges in Massively Distributed Clouds
Location: Floor 3: Salon A
Wednesday, 2:15 pm
6410 - Agile Cloud Security
Location: Floor 3: Salon A
Critical Infrastructure
Monday, 10:00 am
3111 - Can IT and OT Ever Come to the Same Table? (Workshop Part 1)
Location: Room 202
Tuesday, 10:30 am
5119 - Using Public Data to Alert Organizations of Vulnerabilities
Location: Floor 3: Salon H
Tuesday, 1:45 pm
5219 - The Changing OT Risk Landscape: Implications for CISOs and C-Suite
Location: Floor 3: Salon H
Tuesday, 1:45 pm
3210 - Can IT and OT Ever Come to the Same Table? (Workshop Part 2)
Location: Room 202
Tuesday, 3:00 pm
5319 - Developing a Connected Asset/IoT Security Program
Location: Floor 3: Salon H
Tuesday, 4:15 pm
5419 - MIT Research on Managing and Leading Cyber Resilience in Critical Infrastructure Organizations
Location: Floor 3: Salon H
Wednesday, 8:00 am
2219 - Bringing Cyber Mutual Assistance to Electric Utility Operators
Location: Floor 3: Salon H
Wednesday, 9:00 am
6119 - Cybersmart Buildings: Securing Your Investment in Connectivity and Automation
Location: Floor 3: Salon H
Wednesday, 10:15 am
6219 - Internet Modernization Critical Infrastructure Impacts
Location: Floor 3: Salon H
Wednesday, 1:00 pm
6319 - Developing an Industrial Control System's Cybersecurity Management Program
Location: Floor 3: Salon H
Wednesday, 2:15 pm
6419 - The Insecurity of Industrial Things
Location: Floor 3: Salon H
Cyber Crime
Monday, 11:00 am
4219 - Behind the Curtain: Inside the Dark Web
Location: Floor 3: Salon H
Monday, 3:15 pm
4319 - An Introduction to Graph Theory for Security People Who Can’t 'Math Good'
Location: Floor 3: Salon H
Monday, 4:30 pm
4419 - OSINT Research for a Better World: How to Catch a Sexual Predator
Location: Floor 3: Salon H
Wednesday, 8:00 am
2216 - Law, Cybercrime and Cybersecurity: Developments, Problems and Potential Solutions
Location: Floor 3: Salon G
Wednesday, 10:15 am
4119 - Inside The Threat Actor Studio
Location: Floor 4: Salon 3
Wednesday, 10:15 am
6216 - The Internet of (Too Many) Connected Things
Location: Floor 3: Salon G
Wednesday, 1:00 pm
6316 - When the Walls Fell: Barbarians in the Throne Room
Location: Floor 3: Salon G
Wednesday, 2:15 pm
6416 - Wonderful World of P455w0rd Cr4ck1n6
Location: Floor 3: Salon G
Governance, Regulation & Compliance
Monday, 9:45 am
4117 - Securing the Smart City—Data Handling Controls
Location: Floor 4: Salon 1
Monday, 11:00 am
4217 - 'Fitting' EU GDPR Controls into Your Enterprise and Security Architecture
Location: Floor 4: Salon 1
Monday, 3:15 pm
4317 - Is a Security Certification a Get-Out-of-Jail-Free Card?
Location: Floor 4: Salon 1
Monday, 4:30 pm
4417 - Intrusive Monitoring: The Nuclear Option for Monitoring Third Parties
Location: Floor 4: Salon 1
Tuesday, 10:30 am
5117 - Cracks in the Foundation: An Outsider's Perspective on Your Security Program
Location: Floor 4: Salon 1
Tuesday, 1:45 pm
5217 - Certificate Transparency for a More Resilient Certificate Ecosystem
Location: Floor 4: Salon 1
Tuesday, 3:00 pm
5317 - Managing Enterprise Security on a Startup Budget: A CISO Shares Tools and Experiences
Location: Floor 4: Salon 1
Tuesday, 4:15 pm
5417 - Secure Enterprise Design with OMB in Mind
Location: Floor 4: Salon 1
Wednesday, 9:00 am
6117 - Designing Privacy for the Internet of Things: A Product-Oriented Compliance Approach
Location: Floor 4: Salon 1
Wednesday, 10:00 am
3312 - Introduction to PCI DSS Credit Card Security (Part 1) and Hot Topics in PCI DSS (Part 2)
Location: Room 203
Wednesday, 10:15 am
6217 - A Practical Information Security Program for a Corporate Legal Department
Location: Floor 4: Salon 1
Wednesday, 1:00 pm
6317 - Compliance Considerations in Selecting a Cloud Provider
Location: Floor 4: Salon 1
Wednesday, 2:15 pm
6417 - Assessing Inherent and Residual Risks in an Enterprise Applications/Systems Portfolio
Location: Floor 4: Salon 1
Identity & Access Management
Monday, 9:45 am
4114 - Multi-Factor Authentication for Retail
Location: Floor 3: Salon B
Monday, 11:00 am
4214 - Data Security Without Perimeters
Location: Floor 3: Salon B
Monday, 3:15 pm
4314 - Provisioning, Roles and Requests in Identity Management
Location: Floor 3: Salon B
Monday, 4:30 pm
4414 - Biometrics and Multi-Factor Authentication: The Unleashed Dragon
Location: Floor 3: Salon B
Tuesday, 8:00 am
2114 - Have you incorporated Risk Management into your Identity Assurance Program?
Location: Floor 3: Salon B
Tuesday, 1:45 pm
5214 - The Next Tectonic Shift in Identity and Access Management: User Behavioral Analytics
Location: Floor 3: Salon B
Tuesday, 3:00 pm
5314 - Strongest First Factor: Password-less Secure Logins in Your MFA
Location: Floor 3: Salon B
Tuesday, 4:15 pm
5414 - 'Five-Finger Approach' for Efficiently Implementing CIAM in Your Enterprise
Location: Floor 3: Salon B
Wednesday, 9:00 am
6114 - Identity Management – The Missing Puzzle Piece to Solving Threats
Location: Floor 3: Salon B
Wednesday, 10:15 am
6214 - Row and Column Access Control in DB2 LUW 11
Location: Floor 3: Salon B
Wednesday, 1:00 pm
6314 - Combating Hackers and Criminals Using Privileged Access Management
Location: Floor 3: Salon B
Wednesday, 2:15 pm
6414 - Social Login and BYOD—and Their Impact on Authentication Systems
Location: Floor 3: Salon B
Incident Response & Forensics
Monday, 9:45 am
4118 - Legal Qualifications of a Testifying Security Expert Witness in Civil or Criminal Cases
Location: Floor 4: Salon 2
Monday, 11:00 am
4218 - The Era of Cyber Extortion and Ransomware
Location: Floor 4: Salon 2
Monday, 3:15 pm
4318 - Breach Response: How to Use Outside Counsel to Protect Sensitive Information
Location: Floor 4: Salon 2
Monday, 4:30 pm
4418 - Windows Timelines in Minutes
Location: Floor 4: Salon 2
Tuesday, 10:30 am
5118 - The Secret Life of Data: Insights from an International Data Detective
Location: Floor 4: Salon 2
Tuesday, 1:45 pm
5218 - Building an Infrastructure on Deception Techniques
Location: Floor 4: Salon 2
Tuesday, 3:00 pm
5318 - Ignorance: What Does that Event Really Mean?
Location: Floor 4: Salon 2
Tuesday, 4:15 pm
5418 - Securing the Response: Managing Risk Created by IR, Forensics and Litigation
Location: Floor 4: Salon 2
Wednesday, 9:00 am
6118 - Storyboarding Incident Response Methodology: Speed, Synergy and Accuracy
Location: Floor 4: Salon 2
Wednesday, 10:00 am
3310 - It's Not If, But When: How To Build Out Your Cyber Incident Response Plan and The Art and Science of Incident Response (Workshop Parts 1 & 2)
Location: Room 202
Wednesday, 10:15 am
6218 - Bot Detection & Defense
Location: Floor 4: Salon 2
Wednesday, 1:00 pm
6318 - Open Source DFIR Made Easy: The Setup
Location: Floor 4: Salon 2
Wednesday, 2:15 pm
6418 - Incident Response Planning: Making all the Right Decisions Ahead of Time
Location: Floor 4: Salon 2
People & Security
Monday, 9:45 am
4115 - Panel: Ask a Millennial
Location: Floor 3: Salon F
Monday, 11:00 am
4215 - Cyber, Risk and Gender: Is There a White Male Effect in Cybersecurity?
Location: Floor 3: Salon F
Monday, 3:15 pm
4315 - Cybersecurity Careers: It’s Not Just Hacking
Location: Floor 3: Salon F
Monday, 4:30 pm
4415 - Stories from the Front: Running A Local Information Security Organization
Location: Floor 3: Salon F
Tuesday, 8:00 am
2115 - Hacking the Leadership Code: Surviving and Thriving as a Security Leader
Location: Floor 4: Salon 3
Tuesday, 10:30 am
5115 - A Snapshot of Women in Cybersecurity
Location: Floor 3: Salon F
Tuesday, 1:45 pm
5215 - America Got Pentested - How Facebook, Twitter and Google were used to Undermine Democracy
Location: Floor 3: Salon F
Tuesday, 1:45 pm
3212 - Diversity & Inclusion in the Workplace (Workshop)
Location: Room 203
Tuesday, 3:00 pm
5315 - Applying Threat Intelligence to Improve Security Awareness Programs
Location: Floor 3: Salon F
Tuesday, 4:15 pm
5415 - Listen, Learn and Yell: Why IT Professionals and Lawyers Are a Good 'A Team'
Location: Floor 3: Salon F
Wednesday, 8:00 am
2215 - The Road to Hiring is Paved in Good Intentions
Location: Floor 3: Salon F
Wednesday, 9:00 am
6115 - Encore Presentation - Incident Response in the Azure Cloud
Location: Floor 3: Salon F
Wednesday, 10:15 am
6215 - Prepare Like You are Downsizing: Protecting Your Data and Your Organization
Location: Floor 3: Salon F
Wednesday, 1:00 pm
6315 - How to Survive Working in Security as a Woman
Location: Floor 3: Salon F
Professional Development
Monday, 9:45 am
6116 - Gift Card Fraud: Experiences in How to Identify and Handle It
Location: Floor 4: Salon 3
Monday, 11:00 am
4212 - Getting Management on Your Side Without Scare Tactics
Location: Floor 4: Salon 3
Monday, 4:30 pm
4412 - Managing Your Security Career: Why What Got You Here Won't Get You There
Location: Floor 4: Salon 3
Tuesday, 8:00 am
2112 - SSO Volunteer Orientation
Location: Floor 3: Salons F, G, H
Tuesday, 10:15 am
CC-03 - Coffee Talk with David Shearer- The Keys to Success
Location: Booth 500
Tuesday, 10:30 am
5112 - Safe and Secure Online Volunteers: I've Completed Orientation, Now What?
Location: Floor 4: Salon 3
Tuesday, 11:00 am
CC-04 - The 411 on CyberSecurity Certifications and Job Roles
Location: Booth 500
Tuesday, 1:45 pm
5212 - If CISOs are from Mars, Is the Rest of the C-Suite from Venus? Talking Cybersecurity.
Location: Floor 4: Salon 3
Tuesday, 1:45 pm
3211 - CISO Skill Set: The Tools and Techniques You Need to Succeed (Workshop)
Location: Room 201
Tuesday, 2:45 pm
CC-05 - Building the Cybersecurity Workforce for Tomorrow
Location: Booth 500
Tuesday, 3:00 pm
5312 - Elevating Leadership Performance by Getting Out of the Weeds
Location: Floor 4: Salon 3
Tuesday, 4:15 pm
5412 - CISOs Should Use Psychology, Not Technology, to Increase Their Influence and Effectiveness
Location: Floor 4: Salon 3
Wednesday, 8:00 am
2212 - Lessons Learned by a Global Chief Information Security Officer
Location: Floor 4: Salon 3
Wednesday, 9:00 am
6112 - What is EQ and How Will it Help Me at Work?
Location: Floor 4: Salon 3
Wednesday, 1:00 pm
6312 - Developing Security Talent: A DIY Approach
Location: Floor 4: Salon 3
Wednesday, 2:15 pm
6412 - Avoid Road Hazards and Maximize Your Impact As a New Manager
Location: Floor 4: Salon 3
Swiss Army Knife
Monday, 9:45 am
4111 - The Top Vulnerabilities: Comparing Datasets
Location: Floor 3: Salon C
Monday, 11:00 am
4411 - Applying Graph Theory to Digital Forensics Investigations
Location: Floor 3: Salon C
Monday, 2:00 pm
ST03 - Solutions Theater - The Seven Secret Sins of SIEMs
Location: Booth 400
Monday, 3:15 pm
4211 - Using the Host Identity Protocol (HIP) for the Rapid Creation of Secure Enclaves
Location: Floor 3: Salon C
Monday, 4:30 pm
4311 - Complying with New York's Cybersecurity Regulation for Financial Services Companies
Location: Floor 3: Salon C
Tuesday, 8:00 am
2111 - Building an Effective Security Program While Keeping Costs in Check
Location: Floor 3: Salon C
Tuesday, 10:30 am
5114 - Encore Presentation - The Top Vulnerabilities: Comparing Datasets
Location: Floor 3: Salon B
Tuesday, 10:30 am
5111 - You Want to Do
What
with My Cell Phone? Privacy Rights at Border Crossings
Location: Floor 3: Salon C
Tuesday, 1:45 pm
5211 - Cybersecurity Tips, Tools and Techniques CISSPs Need in Their Security Toolkit
Location: Floor 3: Salon C
Tuesday, 3:00 pm
5311 - Ransomware – Tales from the Front Lines
Location: Floor 3: Salon C
Tuesday, 4:15 pm
5411 - Train as You Fight
Location: Floor 3: Salon C
Wednesday, 8:00 am
2211 - Why Does Your Security Awareness Program Suck?
Location: Floor 3: Salon C
Wednesday, 9:00 am
6111 - DNSSEC, DANE, DPRIVE...Oh My! A Primer on the Critical State of DNS Security
Location: Floor 3: Salon C
Wednesday, 10:15 am
6211 - Securing Your Divestiture and Acquisitions: Lessons from the Trenches
Location: Floor 3: Salon C
Wednesday, 1:00 pm
6311 - GDPR - What You Need to Know - A Panel Discussion
Location: Floor 3: Salon C
Wednesday, 2:15 pm
6411 - IT Sabotage and Workplace Violence: Two Sides of the Same Coin?
Location: Floor 3: Salon C
Threats - Inside & Out
Monday, 9:45 am
4113 - Misplaced Trust: The Epidemic of Uncontrolled Code in Web Pages and Apps
Location: Floor 4: Salon 4
Monday, 11:00 am
4213 - Denial, Deception and Attribution: Working Like a Bad Guy to Protect Your Network
Location: Floor 4: Salon 4
Monday, 3:15 pm
4313 - Building a Web Testing Environment Using a PI Zero
Location: Floor 4: Salon 4
Monday, 4:30 pm
4413 - Beyond The Spear: What Can Organizations Do To Deal With Spear Phishing
Location: Floor 4: Salon 4
Tuesday, 8:00 am
2113 - Kill or be Killed: The Art of Red Team versus Blue Team
Location: Floor 4: Salon 4
Tuesday, 10:30 am
5113 - How to Hide Data in Plain Sight Using Steganography
Location: Floor 4: Salon 4
Tuesday, 1:45 pm
5213 - Finding Your SOEL in Security Automation and Orchestration
Location: Floor 4: Salon 4
Tuesday, 3:00 pm
5313 - Encore Presentation - Cloud Security at Chevron: the Journey from Discovery to Secure Adoption
Location: Floor 4: Salon 4
Wednesday, 8:00 am
2213 - Security Through Intel or ‘Learning from Other People’s Mistakes’
Location: Floor 4: Salon 4
Wednesday, 9:00 am
6113 - Build it Once, Build it Right: Cyber and Threat Intelligence
Location: Floor 4: Salon 4
Wednesday, 10:15 am
6213 - Reducing BYOD Risk Using Advanced Threat Detection – A Case Study
Location: Floor 4: Salon 4
Wednesday, 1:00 pm
6313 - Automating the SOC of the Future with Cyber Threat Intelligence
Location: Floor 4: Salon 4
Wednesday, 2:15 pm
6413 - The Battle Among IoT-Based Bots
Location: Floor 4: Salon 4
Back to Top