Let's cross the CISSP off your Bucket List 09:00 - 09:45
GRC - The Swiss Army Knife 10:00 - 10:45
Securing AND Pentesting the Flying Spaghetti Mon... 11:00 - 11:45
Say Hi to the New Guy: How Diverse Backgrounds C... 12:00 - 12:45
Threat Modeling 101: ATT&CK, D3FEND, and the Sec... 13:00 - 13:45
Honeypot Boo Boo: Better Breach Detection with D... 14:00 - 14:45
Came for the Ransomware, Stayed for the APT 15:00 - 15:45
Clippy or SkyNet for your SOC? 16:00 - 16:45
PKI - Avoiding common pitfalls 09:00 - 09:45
What We Do In The Shadows: Going Dark With Consu... 10:00 - 10:45
PCI DSS 4.0 is Out: What Does it Mean for You? 11:00 - 11:45
Ransomware Threat Hunting: Commonly Overlooked A... 12:00 - 12:45
A developers guide for building Zero Trust ready... 13:00 - 13:45
Phishing in 2022 - Google Calendars and dockers... 14:00 - 14:45
Tomb Raiders - The pilfering of critical data fr... 15:00 - 15:45
The Importance of Tabletops from a Firefighters... 16:00 - 16:45