12:30 – 1:30 | Registration & Networking |
1:30 – 1:40 | Welcome & Opening RemarksGreg Huang, Xconomy |
1:40 – 2:05 | Fireside Chat: Assessing the Threat LandscapeMichael Daly, Raytheon |
2:05 – 2:25 | Case Study: Cyber TheftDaniel McGahn, American Superconductor |
2:25 – 2:45 | Case Study: Solving a Security Challenge in the Legal FieldAmanda Fennell, Relativity |
2:45 – 3:10 | Life in a Connected WorldEmily Frye, MITRE Corporation |
3:10 – 3:40 | Networking Break |
3:40 – 3:55 | Case Study: Baiting Hackers with HoneypotsIsrael Barak, Cybereason |
3:55 – 4:15 | Fireside Chat: Navigating Supply Chain SecurityEdna Conway, Cisco |
4:15 – 4:45 | Staying Ahead of the CompetitionSam King, Veracode |
4:45 – 5:05 | Case Study: From Bug to Bounty—Lessons from the Hacker FrontlinesOlivia Brundage, Mapbox |
5:05 – 5:30 | Emerging Security Tools & TacticsMohamad Ali, Carbonite |
5:30 – 6:30 | Networking Reception |
Please note that this schedule is subject to change.