| Registration Open | Registration Open | |
| Breakfast | Breakfast | |
| Capture the Flag | CTF | |
| Introduction | Staff | |
| Day 1 Opening Keynote | Alissa Knight | |
| What exactly is Supply-chain Levels for Software Artifacts (SLSA)? | Nicole Schwartz | |
| AI – Be Afraid – Be Very Afraid – NOT | Vincent Chiew | |
| Securing Your Sanity: Mental Health Strategies for Cybersecurity Experts | Mental Health Panel | |
| The Million Dollar CEO Fraud: Anatomy of a Business Email Compromise | Damien Miller-McAndrews | |
| Red and Blue Teaming and the Powers Gained! Adversarial Emulation | Jason Maynard | |
| Lunch | Lunch | |
| Untangling APIs: Addressing Sprawl and Securing Your Modern Digital Ecosystem | Peter Scheffler | |
| Keeping Ahead of the Threat Landscape with AI Powered Security | Sheik Sahib | |
| De-mystifying Zero Trust in Industrial Control System Environments | Stephen Mathezer | |
| A look to the past for the future of Cyber Security for Cyber Physical Systems | Michelle Balderson | |
| Ransomware Recovery Workshop: Veeam | Ransomware Recovery Workshop: Veeam | |
| Balancing AI Innovation with Data Protection: Risks and Controls | Pooja Shah and Atilade Ayanbadejo | |
| Building Cyber Resilience in the Face of Cyber Attacks | Jason Proctor | |
| The Crushing Chaos of Corporate Crisis: Bringing Our Best to Incident Response | Adam McMath | |
| Lets Make Fun of Cyber Security | Prashant Prashant | |
| VIP Cocktails and Light Dinner | VIP Cocktails and Light Dinner | |