Agenda

Agenda

 

[tabgroup animation=”fadeInUp”] [tab title=”Training Day – 05.18.2017″]

 Peter Kim   8:00 – 4:00pm Location: BALLROOM A
TRAINING: Real World Red Team Attacks

The days of exploiting MS08-067, encoding with Shikata Ga Nai, and blindly scanning are gone.  Both Blackhat hackers and pentesters alike have shifted to using more advanced techniques to bypass AV, implement a smaller footprint to evade SIEM detection, and continually stay persistent to devastate enterprise networks.  If you are looking to take your craft to the next level, this is the primer course for you.

Written and taught by the author of “The Hacker Playbook” series, Peter Kim will take you through an immensely hands-on experience to replicate real world attacks without even running a single vulnerability scanner.  In this hands-on experience, you will take on the role of a malicious Blackhat attacker and infiltrate your way into a corporate network.  The onsite lab will emulate a real network using only modern operating systems.
 Kevin Cardwell   8:00 – 4:00pm Location: BALLROOM B
TRAINING: Essential Defense Tactics

In this hands-on training you will learn the foundation of security and defending architectures from attack. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the IT corporate networks as well as industrial control networks. You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set you will look at the best practices recommendations when it comes to reducing the attack surface. You will learn a systematic process of intrusion and malware analysis.

This intensive course will introduce an attack that completely compromises systems and networks, once you have done this you will design defensive mechanisms to either prevent the attack, or isolate it if prevention is not possible.

 

 Jim Manico   9:00 – 4:00pm Location: CLUB ROOM
TRAINING: Web Security Attack & Defense

This training will teach both an attack and defense perspective on a wide range of web application security issues. The presenters will illustrate each specific web security vulnerabilities, demonstrate several exploitation techniques, guide students through a series of hands-on labs on how to conduct the same attack, and then demonstrate developer-centric defense methods to stop said attacks deep in code. We will also analyze several recent and devastating real world web application hacks and explain how they could have been stopped via defensive coding techniques.

 Mickael Felker   8:00 – 4:00pm Location: HIRO ROOM
TRAINING: Information Security Management Boot Camp for IT Professionals

Information security has become part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Adding to the security management challenge, users are demanding to work from anywhere on any device.

Designed for both in-house IT staff and IT vendors, ISSA-LA’s Information Security Management Boot Camp combines practical advice with sound security management insight.

 Kevin Cardwell  4:00 – 5:00pm Location: BALLROOM B
TALK: Solid Defense Strategies

In this session, I will discuss essential defensive strategies you can deploy and protect from the majority of the attacks that are in the news. I will show quick win that you can deploy that will make you organization more difficult to attack. The session will conclude with a demonstration of how to setup segmentation and isolation to protect your networks.

Panelists: My-Ngoc Nguyen, Diane Delaney, Shea McHugh, Andrea Hoy, Max Shuftan  5:00 – 6:00pm Location: BALLROOM A
SANS CONNECT: WOMEN IN SECURITY AND TECHNOLOGY PANEL

 

 Reception  6:00 – 9:00pm : Location: COURTYARD
SUMMIT 9 OPENING RECEPTION @ UNIVERSAL CITY HILTON! – “Join your friends under the stars…”

 

 

[/tab] [/tab] [/tabgroup] [space] [space]

Summit Day – 05.19.2017

[tabgroup animation=”fadeInUp”] [tab title=”Ballrooms A-D” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 at 7:30
REGISTRATION, BREAKFAST, AND VENDOR EXPO

 

  Richard Greenberg, Summit Chair  at 8:15
WELCOME ADDRESS

 

 Keynote: FIGHTING SOPHISTICATED ATTACKS WITH ADVANCED PERSISTENT SECURITY  at 8:30
OPENING KEYNOTE WITH IRA WINKLER

 

 Sponsor Event: enSilo   at 9:20
DIAMOND SPONSOR GREETING WITH JEFFREY DURAN

 

 Sponsor Event: Darktrace   at 9:25
DIAMOND SPONSOR GREETING WITH TRISTAN PETAK

 

 Keynote: 7 VERTICAL LESSONS & 1 ESSENTIAL QUESTION FOR LEADING WITH IMPACT  at 9:30
KEYNOTE WITH MANLEY FEINBERG

 

 at 10:20
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

 Sponsor Event: ServiceNow  at 5:00
PLATINUM SPONSOR GREETING WITH DARIN DICK

 

 KEYNOTE: SCALING THE DATA MOUNTAIN WITHOUT PUTTING PRIVACY AT RISK   at 5:10
CLOSING KEYNOTE WITH RICHARD STIENNON

 

 Yev Avidon. Summit Co-Chair  at 5:55

CLOSING ADDRESS

 Reception  at 6:00
COCKTAIL RECEPTION AND RAFFLE PRIZES

[/tab] [tab title=”Ballroom A”]

 at 10:20
BREAK & VENDOR EXPO

 

 Bill Cheswick  at 11:00
COMPUTER SECURITY: I THINK WE CAN WIN!

 

 Bob Bigman  at 12:00

THE TRUTH ABOUT CYBER SECURITY

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Jennifer Granick  at 2:30

AMERICAN SPIES, MODERN SURVEILLANCE, AND YOU.

 

 Eva Galperin  at 3:30

WHEN GOVERMENTS ATTACK: MALWARE TARGETING ACTIVISTS, LAWYERS, AND JOURNALISTS

 

 at 4:20
BREAK & VENDOR EXPO

 

[/tab] [tab title=”Ballroom B” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 at 10:20
BREAK & VENDOR EXPO

 

 Moderator: Suedy Renner, Panelists: Chenxi Wang, Debra Farber, Jennifer Granick, Erin Richards  at 11:00
WOMEN IN SECURITY PANEL

 

Chenxi Wang at 12:00
DIGITAL TRUST IN THE ERA OF ARTIFICIAL INTELLIGENCE

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Moderator: Maria Ramirez Panelists: Dave Babcock, Warren Kato, John Palmieri and Britton Schaefer at 2:30
LAW ENFORCEMENT PANEL 

 

 Valerie Thomas  at 3:30
DEFENDING THE ENTERPRISE AGAINST SOCIAL ENGINEERING ATTACKS

 

 at 4:20
BREAK & VENDOR EXPO

 

[/tab] [tab title=”Ballroom C-Healthcare Forum” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

  at 10:20
BREAK & VENDOR EXPO

 

 Yun-kyung (Peggy) Lee, Office of Civil Rights  at 11:00
HIPAA, OCR, BREACHES, AUDITS AND YOU!

 

 Moderator: Richard Greenberg, Panelists: Chris W. Joerg, Stan Banash, Todd Friedman, Brian Kreitzer  at 12:00
HEALTHCARE CISO PANEL

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Moderator: Cynthia Stamer Panelists: Ron Raether and Jennifer Rathburn at 1:30
 LUNCH PANEL: Finding & Negotiating The Mine Fields: CISO, CIO & Privacy Officer’s Playbook for Promoting Compliance & Security Without Getting Fired

 

 Evan Wheeler  at 2:30
OVERHAULING YOUR RISK MANAGEMENT PROGRAM

 

  Moderator: Cynthia Stamer Panelists: James Brady, Mark Kadrish, Gary Gooden  at 3:30
PANEL: WHAT INITIATIVES ARE ON THE HORIZON IN HEALTHCARE, AND HOW CAN WE SECURE THEM?

 

 at 4:20
BREAK & VENDOR EXPO

[/tab] [tab title=”Ballroom D” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 at 10:20
BREAK & VENDOR EXPO

 

 Eric Chien  at 11:00
WANNACRY – THE FASTEST MOST DAMAGING WORM IN YEARS

 

 Diamond Sponsor Event: enSilo –  Jeffrey Duran  at 12:00
YOUR ORGANIZATION WILL BE ATTACKED. BUT YOUR DATA ISN’T GOING ANYWHERE

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 Andea Hoy  at 2:10
ISSA INTERNATIONAL – UPDATE

 

 Jim Manico  at 2:30
OWASP TOP TEN FOR 2017

 

 Diamond Sponsor Event: Darktrace –  Tristan Petak  at 3:30
UNSUPERVISED MACHINE LEARNING: A NEW APPROACH TO CYBER DEFENCE

 

 at 4:20
BREAK & VENDOR EXPO

[/tab] [tab title=”Club Room-CISO Forum” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 at 10:20
BREAK & VENDOR EXPO

 

 Mark Weatherford  at 11:00
WELCOME ADDRESS: THE INTERNET OF (INSECURE)THINGS: WE FORGOT ‘THE CYBER’

 

 Diana Kelley  at 12:00
 SUPERSIZED CYBERSECURITY GROUNDHOG DAY – INSIGHTS FOR PREVENTING 2016 FROM REPEATING

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 CISO Lunch  at 1:40
CISO ROUNDTABLE DISCUSSIONS

 

 Presentors: Dan Meacham, Mike Villegas, David K Son, Scott Hennon  at 2:30
ROUNDTABLE DISCUSSION PRESENTATIONS

 

 Moderator: Richard Greenberg, Panelists: Malcolm Harkins, Gary HayslipBruce Phillips and Robb Reck  at 3:30
CISO CLOSING PANEL

 

 at 4:20
BREAK & VENDOR EXPO

 

[/tab] [tab title=”Hiro Room-Capture the Flag/Challenge Room” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 

 Presented by Marcus Richerson, Alex Kissinger, Erik Parreira  9:00– 4:00pm

CAPTURE THE FLAG/CHALLENGE ROOM

Our friends from Somerset Recon and AttackIQ prepared all day program!!!!

 at 11:00
BREAK & VENDOR EXPO

 

 at 12:50
LUNCH AND VENDOR EXPO

 

 at 4:20
BREAK & VENDOR EXPO

 

[/tab]

 

[tab title=”Sierra Foyer” icon=”fa-home(Check Font awesomes for Icon Class Names)”]

 Registration and Vendor Expo  at 7:30am to 6:00pm
REGISTRATION & VENDOR EXPO

[/tab] [space] [/tabgroup]