top of page

SCHEDULE

8:15am                         |  Conference Registration Starts

8:30am - 9:00am          |  Conference Sponsor Showcase

8:30am - 9:00am          |  Breakfast

9:00am - 9:15am          |  Welcome Address |  Ken Fishkin, Bill D'alla and Stan Mierzwa

9:15am - 9:45am          |  Keynote: It Takes a Village – Or Does It? |  Niloufer Tamboly

9:45am - 10:15am        |  Keynote: The State of Cybersecurity |  Michael Geraghty

10:25am – 11:05am     |  Panel - How Government Agencies Can Help Against Cyber Scams and Breaches |  

Anthony Zissimos, Brian Herron, Krista Valenzuela and Ken Fishkin

10:25am - 11:05am      |  Threat Modeling Cloud Workloads: An Applied Approach |  David Garibaldi

10:25am - 11:05am      |  Terminator Unplugged: AI's role in social engineering's attack vector |  James McQuiggan​

10:25am -11:05am       |  The Cyber Interview: Navigating the Complexities of Hiring in Cybersecurity | Ralph Ralph L. Peavy Jr.

10:25am - 11:05am      |  Building Digital Trust in an AI Age: Challenges and Opportunities - Jason Juliano

11:05am - 11:15am      | 10 minute break

11:15am - 12:00pm      |  Panel - What Lurks Below the Surface – Understanding and Managing Third Party Risk |

Mark Schleisner, Jason Starr, Sophia Kokolis and Jim Ambrosini

11:15am - 12:00pm      |  Private 5G Networks Security |  Peter Thermos

11:15am - 12:00pm      |  The Cybersecurity Dilemma |  Dr. Erdal Ozkaya

11:15am – 12:00pm     |  Risk/Control, Audit Management - A Great Career Path for a Female IT Leader |  Jennifer Bayuk

11:15am – 12:00pm     |  Creating Your Digital Learning Employment Record - Nicholas Erb

11:15am – 12:00pm     |  Crush Your Interviews & Negotiate Your Salary - Kip Boyle (Virtual Only)

12:00pm - 12:10am      |  10 minute break

12:10pm - 12:40pm     |  Cyber Resilience | Rob McLeod

12:10pm - 12:40pm     |  A DC Update: Cyber Regulation, Policy and Legislation | Brandon Pugh

12:10pm - 12:40pm     |  TBD |  Kean University Students - Robin Singh and Jaineel Shah

12:10pm - 12:40pm      |  How To Share Your Secrets With Friends, Acquaintances and Strangers:

A Relatable Explanation of Third-Party Cyber Risk Management | KC Udoh

12:10pm – 12:40pm     |  Career Track Advice Panel

12:40pm - 1:30pm       |  Lunch

1:30pm - 2:15pm         |  Panel - A Candid Discussion on the Risks of Generative AI Tools |  

Decanda Fauk, Michelle Schaap, Ester Poulsen and Ken Fishkin

1:30pm - 2:15pm         |  Demystifying Cyber Threat Intelligence: People, Processes, and Technologies |  Grace Chi

1:30pm - 2:15pm         |  Fireside Chat - Zero Trust Architecture: Because trusting anyone is so 2020 | 

John Linkowsky and Joel Rosenblatt

1:30pm - 2:15pm         |  IT GRC Session - Laura Descoteau

1:30pm - 2:15pm         |  LinkedIn: Unveiling Your Hidden Arsenal for Success | Alexandra Tarabour

2:15pm - 2:25pm         |  10 minute break

2:25pm - 3:10pm         |  Keynote: Deserving the Budget You Need | Ira Winkler

3:10pm - 3:20pm         |  10 minute break

3:20pm - 4:05pm         |  Panel - The Future of Cybersecurity- Our Favorite Predictions |

Gina Pierson, Lori Polansky, Sharon Kelly and Debra Price

3:20pm - 4:05pm         |  When Digital and Physical Stalking Collide | Scott Schober

3:20pm - 4:05pm         |  Panel - Incident Response - RTFM edition |

Christopher Liccardi, Alex Waintraub and  Yolanda Baker

3:20pm - 4:05pm         |  Security Compliance Maturity Model | Eden Amitai

3:20pm - 4:05pm         |  From Bytes to Handshakes: Effective Networking Strategies for Cybersecurity Professionals | Miguel Angulo

4:05pm - 4:15pm         |  10 minute break

4:15pm - 4:55pm         |  Borders and Breaches | Black Hills Information Security

4:15pm - 4:55pm         |  Tactics and Strategies to Launch a Successful Career in Cybersecurity | Panel discussion moderated by Indu Subramanian

4:55pm - 5:00pm         |  Closing Remarks

bottom of page