Monday, April 8
12:30 – 1:30 |
Registration & Networking |
1:30 – 1:40 |
Welcome & Opening RemarksGreg Huang, Xconomy |
1:40 – 2:05 |
Fireside Chat: Assessing the Threat LandscapeMichael Daly, Raytheon |
2:05 – 2:25 |
Case Study: Cyber TheftDaniel McGahn, American Superconductor |
2:25 – 2:45 |
Case Study: Solving a Security Challenge in the Legal FieldAmanda Fennell, Relativity |
2:45 – 3:10 |
Life in a Connected WorldEmily Frye, MITRE Corporation |
3:10 – 3:40 |
Networking Break |
3:40 – 3:55 |
Case Study: Baiting Hackers with HoneypotsIsrael Barak, Cybereason |
3:55 – 4:15 |
Fireside Chat: Navigating Supply Chain SecurityEdna Conway, Cisco |
4:15 – 4:45 |
Staying Ahead of the CompetitionSam King, Veracode |
4:45 – 5:05 |
Case Study: From Bug to Bounty—Lessons from the Hacker FrontlinesOlivia Brundage, Mapbox |
5:05 – 5:30 |
Emerging Security Tools & TacticsMohamad Ali, Carbonite |
5:30 – 6:30 |
Networking Reception |
Please note that this schedule is subject to change.