top of page

2024 Schedule Mon Sept 23

Time
Talk Title
Location
8:00am-5:00pm
Registration
Atrium
8:00am-9:00am
Breakfast
Atrium
8:00am-5:00pm
Capture-the-Flag
Atrium
8:30am-5:30pm
Certification Workshop
TBD
9:00am-9:15am
Opening Remarks
Conference Hall (PIC 120/122)
9:15am-10:30am
Tales From the Crypt…Analyst: The After Life
Conference Hall (PIC 120/122)
10:40am-11:25am
Microsoft Security Co-Pilot: Do you really need AI in your SOC?
Conference Hall (PIC 120/122)
10:40am-12:20pm
Securing Your Sanity: Mental Health Strategies for Cybersecurity Experts: Mental Health Panel
PIC 232
10:40am-11:25am
Pragmatic Information Security in Law Enforcement
PIC 233
11:35am-12:20pm
Securing the Digital Supply Chain: What we should do for Supply Chain Security in DevSecOps?
Conference Hall (PIC 120/122)
11:35am-12:20pm
Securing Buy-In for Security Budgets (WiCys Panel)
PIC 233
12:30pm-1:30pm
Lunch
Atrium
1:30pm-4:05pm
Beyond Recognition: A Cautionary Tale of AI and Identity Fraud
Conference Hall (PIC 120/122)
1:30pm-2:15pm
Palo Alto
PIC 232
1:30pm-2:15pm
Disinform your Surroundings: AI and disinformation campaigns
PIC 233
2:25pm-3:10pm
The Human Factor: Building a Culture of Identity Security in a Decentralized Workforce
Conference Hall (PIC 120/122)
2:25pm-3:10pm
Data Resiliency: The Unsung Hero in the Battle Against Cyber Breaches
PIC 232
2:25pm-3:10pm
Fabricated Realities: AI Personas and Simulacra and the Threats They Pose
PIC 233
3:20pm-4:05pm
Securing the Internet of Things (IoT) in a Decentralized World
Conference Hall (PIC 120/122)
3:20pm-4:05pm
Disrupting Advanced Attacks Using Deception
PIC 232
3:20pm-4:05pm
A New RaaS Bonanza
PIC 233
4:15pm-5:00pm
Raising Our Kids In A Connected World
Conference Hall (PIC 120/122)
4:15pm-5:00pm
Unveiling Cybersecurity's Triumvirate: Red, Blue, and Purple Teams
PIC 232
4:15pm-5:00pm
The Effects of Weaponized Malware on End-to-End Encryption and Exfiltrating Data from Signal Messenger
PIC 233
5:30pm-7:30pm
Dinner - Speakers, VIPs, Staff, and Volunteers
PIC 3rd Floor

2024 Schedule Tue Sept 24

Time
Talk Title
Location
8:00am-4:00pm
Registration
Atrium
8:00am-9:00am
Breakfast
Atrium
8:00am-4:00pm
Capture-the-Flag
Atrium
9:00am-9:15am
Opening Remarks
Conference Hall (PIC 120/122)
9:00am-12:30pm
Threat Hunting with Jupyter Notebooks
PIC 234
9:00am-12:30pm
Threat Hunting with Jupyter Notebooks
PIC 234
9:15am-10:30am
Keynote
Conference Hall (PIC 120/122)
10:40am-11:25am
Improving Cyber Risk Management with Threat Modeling
Conference Hall (PIC 120/122)
11:35am-12:20pm
Beyond the Buzz: Assessing AI's Authentic Role in Enhancing Cybersecurity Measures
PIC 232
10:40am-11:25am
AppSec From the Ground Up
PIC 233
11:35am-12:20pm
Hacking SCADAs for fun and Profit: Hacking ICS, Oil Rigs and Vessels
Conference Hall (PIC 120/122)
11:35am-12:20pm
Stand-out Strategies for Young Professionals: Five Effective Habits For Getting You Hired
PIC 232
11:35am-12:20pm
Security Architecture, An Adventure?
PIC 233
12:30pm-1:30pm
Lunch
Atrium
1:30pm-2:15pm
Stories from the trenches - How a red team exercise gained full control of a client network
Conference Hall (PIC 120/122)
1:30pm-2:15pm
Evolution of Risk Management in Software
PIC 232
1:30pm-2:15pm
Revolutionizing Cyber Defense: The NIST CSF 2.0 Advantage
PIC 233
1:30pm-4:05pm
All Thriller, No Filler: Crisis Communications Workshop
PIC 234
2:25pm-3:10pm
Differences Between European And Canadian Approach For Cybersecurity
Conference Hall (PIC 120/122)
2:25pm-3:10pm
Guardians of the Code: Securing Enterprise Software Supply Chains
PIC 232
2:25pm-3:10pm
Streamlining Threat Hunting in Cloud Environments with Jupyter
PIC 233
3:20pm-4:05pm
Developing Cybersecurity - How do you make Staff Know Security.
Conference Hall (PIC 120/122)
3:20pm-4:05pm
Discover the Unseen: Azure Vulnerability Exploitation [Pending]
PIC 232
3:20pm-4:05pm
MITRE Attack Flow: Laying Foundations for Predictive Intelligence
PIC 233
4:15pm-5:00pm
Closing Remarks
Conference Hall (PIC 120/122)
bottom of page