The Monday Technical Sessions are broken down into 15 different sessions from 9:30 a.m. – 3:30 p.m. Each session has a different topic led by a top leader in the field to teach on a specific training item in cyber security. Select 5 of 15 sessions to attend.
9:30-10:20 AM
(Choose 1)
Tech Session 1A – Active Vulnerability Management
Tech Session 1B – Part One: Pillsbury Theater Group “Breaking Ice” Event. – “Breaking the Ice” for courageous and productive dialogue around issues of diversity, equity and inclusion in the workplace.
Tech Session 1C – Getting Started on Application Security
10:30-11:20 AM
(Choose 1)
Tech Session 2A – Not All Threats are External
Tech Tech Session 2B – Part Two: Pillsbury Theater Group “Breaking Ice” Event sponsored by Saviynt, Inc. – “Breaking the Ice” for courageous and productive dialogue around issues of diversity, equity and inclusion in the workplace.
Tech Tech Session 2C – Application Security Automation in Development
12:30-1:20 PM
(Choose 1)
Tech Session 3A – Modernizing Security Software Engineering To Secure By Default
Tech Session 3B – Leading High Performing Teams During a Global Pandemic
Tech Session 3C – Are you finding your cloud a little too foggy?
1:30-2:20 PM
(Choose 1)
Tech Session 4A – Improving Threat Detection with a Detection-Development Life Cycle
Tech Session 4B – A Bug Hunters Guide to GCP
Tech Session 4C – Purple Teams Best Practices, Metrics and Freeware
2:30-3:20 PM
(Choose 1)
Tech Session 5A – Tailor Your Cyber Threat Intel Program and Optimize Resources
Tech Session 5B – How Data Classification Tools can Spark Conversation and Drive Change at your Company
Tech Session 5C – Building an Effective Cyber Security Engineering Organization
Following the sessions, explore resources from our solution strategy providers and establish new professional relationships during the Virtual EXPO Hall Opening from 3:30 – 5:00 p.m.
Identifying and Analyzing Adversary Infrastructure and Malware
Adversaries try as much as possible to blend in with behavior that appears normal. However, their operations result in malicious activity, and therefore must at some point deviate from what is “normal” and develop specific patterns which can be identified over time. This training will teach the audience how to analyze adversary infrastructure used for command and control and delivery, focused on attribution and correlation. The goal of the training is that the audience will be able to identify adversary infrastructure, and find related activity based on their own research.
Speakers: Michael Schwartz, Dir. of Threat Intelligence and Detection Engineering, Target Corporation; Derek Thomas, Sr. Information Security Analyst, Target Corporation
Following the workshop, explore resources from our solution strategy providers and establish new professional relationships during the Virtual EXPO Hall Opening from 3:30 – 5:00 p.m.
To learn about available sponsorship opportunities, contact Jennifer Churchill at 763-548-1306 or jennifer.churchill@eventshows.com.