A | C | D | E | F | G | H | I | J | ||
---|---|---|---|---|---|---|---|---|---|---|
1 | Start (EST) | End (EST) | Start (GMT) | End (GMT) | Room 1 | Room 2 | Room 3 | Room 4 | Room: Cyber Defense Matrix Workshop | |
2 | 10:30 | 11:00 | 15:30 | 16:00 | SECON International Chapter Conference - Networking | |||||
3 | 11:00 | 11:10 | 16:00 | 16:10 | Welcome remarks by SECON International Committee and Opening remarks with Tara Wisniewski, ISC2 Executive VP | None | None | None | ||
4 | 11:10 | 11:15 | 16:10 | 16:15 | Break | |||||
5 | 11:15 | 11:45 | 16:15 | 16:45 | Olivia Rose - Opening KeyNote | Ira Winkler - Opening KeyNote | None | None | ||
6 | 11:45 | 11:50 | 16:45 | 16:50 | Break | |||||
7 | 11:50 | 12:05 | 16:50 | 17:05 | Ken Fishkin (New Jersey Chapter) - The Importance of Joining Your Local ISC2 Chapter | Paolo Ottolino (Italy Chapter) - Application Security: Design Shutters - Reusable Elements for Securing Software Design | Neranjan Dissanayake (Colombo, Sri Lanka Chapter) - Bridging Realms: Navigating the Confluence of IoT, OT, ICS, and IACS for an Industrial Renaissance | Jacek Grymuza (Poland Chapter) - Mastering Network Threat Hunting | Sounil Yu - Cyber Defense Matrix Workshop | |
8 | 12:05 | 12:10 | 17:05 | 17:10 | Break | |||||
9 | 12:10 | 12:25 | 17:10 | 17:25 | Angus Chen (National Capital Region Chapter) and Glendon Schmitz - Quantum Computing, Cyber Espionage, Cryptography, AI, and Analytics | Moshe Weis and Assaf Morag (Israel Chapter) - A Symbiotic Journey of CISO Expertise and Researcher Insight in Cloud Native Environments | Patrick Park (New Jersey Chapter) - Strategy for a Passwordless Environment | Robert Fritz (Atlantic, Canada Chapter) - An Ethics Framework for Cybersecurity Governance and Leadership | ||
10 | 12:25 | 12:30 | 17:25 | 17:30 | Break | |||||
11 | 12:30 | 12:45 | 17:30 | 17:45 | Arturo Santos (South Florida Chapter) - Secure AI Implementation for Critical Infrastructure | Corina Popescu (Toronto, Canada Chapter) - The Lifecycle of Phishing: From Generation, to Detection and Removal, leveraging ML and AI | Tran Cheung (New Jersey Chapter) - How Do You Trust an AI Model? Reduce Risk with the NIST AI RMF | Samuel Modupe (Nigeria Chapter) - Managing Cloud Security in the Modern Workspace | ||
12 | 12:45 | 12:50 | 17:45 | 17:50 | Break | |||||
13 | 12:50 | 13:05 | 17:50 | 18:05 | Kudzai Lazarus Mudyiwa (South Africa, Gauteng Chapter) - Generative AI Security Frameworks for Government Agencies | Gaurav Singh (National Capital Region Chapter) - Enhancing Supply Chain Resiliency Through Cybersecurity | Ariel Vudoyra Cardenas (Mexico City Chapter) - Security Governance | Sofiane Chafai (El Djazair, Algeria Chapter) - New Challenges for a Reliable Use and Deployment of Trustworthy AI | ||
14 | 13:05 | 13:10 | 18:05 | 18:10 | Break | |||||
15 | 13:10 | 13:25 | 18:10 | 18:25 | Jorge Carrillo, PhD. (Czech Chapter) - What Does Transparency Mean in AI? | John Checco (NY Metro Chapter) - A People-Centric Approach to Breaking the Attack Chain | Johannes Braams and Richard Daniel (The Netherlands Chapter) - Cyber Security Light at the End of the Regulated Tunnel | Elad Motola - ISO 27001: Bridging the Gap Between 2013 & 2022 Versions | ||
16 | 13:25 | 13:30 | 18:25 | 18:30 | Break | |||||
17 | 13:30 | 14:00 | 18:30 | 19:00 | Dr. Erdal Ozkaya - Closing KeyNote | None | None | None | ||
18 | 14:00 | 14:30 | 19:00 | 19:30 | SECON International Chapter Conference - Networking | |||||
19 | ||||||||||
20 | ||||||||||
21 | ||||||||||
22 | ||||||||||
23 | ||||||||||
24 | ||||||||||
25 | ||||||||||
26 | ||||||||||
27 | ||||||||||
28 | ||||||||||
29 | ||||||||||
30 | ||||||||||
31 | ||||||||||
32 | ||||||||||
33 | ||||||||||
34 | ||||||||||
35 | ||||||||||
36 | ||||||||||
37 | ||||||||||
38 | ||||||||||
39 | ||||||||||
40 | ||||||||||
41 | ||||||||||
42 | ||||||||||
43 | ||||||||||
44 | ||||||||||
45 | ||||||||||
46 | ||||||||||
47 | ||||||||||
48 | ||||||||||
49 | ||||||||||
50 | ||||||||||
51 | ||||||||||
52 | ||||||||||
53 | ||||||||||
54 | ||||||||||
55 | ||||||||||
56 | ||||||||||
57 | ||||||||||
58 | ||||||||||
59 | ||||||||||
60 | ||||||||||
61 | ||||||||||
62 | ||||||||||
63 | ||||||||||
64 | ||||||||||
65 | ||||||||||
66 | ||||||||||
67 | ||||||||||
68 | ||||||||||
69 | ||||||||||
70 | ||||||||||
71 | ||||||||||
72 | ||||||||||
73 | ||||||||||
74 | ||||||||||
75 | ||||||||||
76 | ||||||||||
77 | ||||||||||
78 | ||||||||||
79 | ||||||||||
80 | ||||||||||
81 | ||||||||||
82 | ||||||||||
83 | ||||||||||
84 | ||||||||||
85 | ||||||||||
86 | ||||||||||
87 | ||||||||||
88 | ||||||||||
89 | ||||||||||
90 | ||||||||||
91 | ||||||||||
92 | ||||||||||
93 | ||||||||||
94 | ||||||||||
95 | ||||||||||
96 | ||||||||||
97 | ||||||||||
98 | ||||||||||
99 | ||||||||||
100 |