.png)


SCHEDULE
8:15am | Conference Registration Starts
8:30am - 9:00am | Conference Sponsor Showcase
8:30am - 9:00am | Breakfast
9:00am - 9:15am | Welcome Address | Ken Fishkin, Bill D'alla and Stan Mierzwa
9:15am - 9:45am | Keynote: It Takes a Village – Or Does It? | Niloufer Tamboly
9:45am - 10:15am | Keynote: The State of Cybersecurity | Michael Geraghty
10:25am – 11:05am | Panel - How Government Agencies Can Help Against Cyber Scams and Breaches |
Anthony Zissimos, Brian Herron, Krista Valenzuela and Ken Fishkin
10:25am - 11:05am | Threat Modeling Cloud Workloads: An Applied Approach | David Garibaldi
10:25am - 11:05am | Terminator Unplugged: AI's role in social engineering's attack vector | James McQuiggan
10:25am -11:05am | The Cyber Interview: Navigating the Complexities of Hiring in Cybersecurity | Ralph Ralph L. Peavy Jr.
10:25am - 11:05am | Building Digital Trust in an AI Age: Challenges and Opportunities - Jason Juliano
11:05am - 11:15am | 10 minute break
11:15am - 12:00pm | Panel - What Lurks Below the Surface – Understanding and Managing Third Party Risk |
Mark Schleisner, Jason Starr, Sophia Kokolis and Jim Ambrosini
11:15am - 12:00pm | Private 5G Networks Security | Peter Thermos
11:15am - 12:00pm | The Cybersecurity Dilemma | Dr. Erdal Ozkaya
11:15am – 12:00pm | Risk/Control, Audit Management - A Great Career Path for a Female IT Leader | Jennifer Bayuk
11:15am – 12:00pm | Creating Your Digital Learning Employment Record - Nicholas Erb
11:15am – 12:00pm | Crush Your Interviews & Negotiate Your Salary - Kip Boyle (Virtual Only)
12:00pm - 12:10am | 10 minute break
12:10pm - 12:40pm | Cyber Resilience | Rob McLeod
12:10pm - 12:40pm | A DC Update: Cyber Regulation, Policy and Legislation | Brandon Pugh
12:10pm - 12:40pm | TBD | Kean University Students - Robin Singh and Jaineel Shah
12:10pm - 12:40pm | How To Share Your Secrets With Friends, Acquaintances and Strangers:
A Relatable Explanation of Third-Party Cyber Risk Management | KC Udoh
12:10pm – 12:40pm | Career Track Advice Panel
12:40pm - 1:30pm | Lunch
1:30pm - 2:15pm | Panel - A Candid Discussion on the Risks of Generative AI Tools |
Decanda Fauk, Michelle Schaap, Ester Poulsen and Ken Fishkin
1:30pm - 2:15pm | Demystifying Cyber Threat Intelligence: People, Processes, and Technologies | Grace Chi
1:30pm - 2:15pm | Fireside Chat - Zero Trust Architecture: Because trusting anyone is so 2020 |
John Linkowsky and Joel Rosenblatt
1:30pm - 2:15pm | IT GRC Session - Laura Descoteau
1:30pm - 2:15pm | LinkedIn: Unveiling Your Hidden Arsenal for Success | Alexandra Tarabour
2:15pm - 2:25pm | 10 minute break
2:25pm - 3:10pm | Keynote: Deserving the Budget You Need | Ira Winkler
3:10pm - 3:20pm | 10 minute break
3:20pm - 4:05pm | Panel - The Future of Cybersecurity- Our Favorite Predictions |
Gina Pierson, Lori Polansky, Sharon Kelly and Debra Price
3:20pm - 4:05pm | When Digital and Physical Stalking Collide | Scott Schober
3:20pm - 4:05pm | Panel - Incident Response - RTFM edition |
Christopher Liccardi, Alex Waintraub and Yolanda Baker
3:20pm - 4:05pm | Security Compliance Maturity Model | Eden Amitai
3:20pm - 4:05pm | From Bytes to Handshakes: Effective Networking Strategies for Cybersecurity Professionals | Miguel Angulo
4:05pm - 4:15pm | 10 minute break
4:15pm - 4:55pm | Borders and Breaches | Black Hills Information Security
4:15pm - 4:55pm | Tactics and Strategies to Launch a Successful Career in Cybersecurity | Panel discussion moderated by Indu Subramanian
4:55pm - 5:00pm | Closing Remarks