ACDEFGHIJKLMNOPQRSTUVWXYZAAABACADAE
1
Start (EST)End (EST)Start (GMT)End (GMT)Track 1Track 2Track 3Track 4
2
11:0011:1516:0016:15Opening remarks with Clar Rosso
3
11:1511:2016:1516:20Break
4
11:2011:5016:2016:50Keynote 1 - Nir ZukKeynote 2 - Yuri DiogenesKeynote 3 - Marnix DekkerNone
5
11:5011:5516:5016:55Break
6
11:5512:1016:5517:10Speaker - Jon France (ISC) CISOSpeaker - Yiannis Koukouras - Secure SDLC: How to build security into your Agile processesSpeaker - Pablo Barrera - Incident Response Strategies Speaker - Jim Ambrosini - We are SOC2 and ISO 27001 certified. What could go wrong?
7
12:1012:1517:1017:15Break
8
12:1512:3017:1517:30Speaker - Arthur Hedge - Microsoft Teams SecuritySpeaker - Gabriel Wierzbieniec - Tower Defense: Cloud EditionSpeaker - Maor Tal - The Silent Storm: Red Team Aspect in Cloud EnvironmentsSpeaker - Yurika Kakiuchi - Introducing Japan Chapter's activities and call for collaboration
9
12:3012:3517:3017:35Break
10
12:3512:5017:3517:50Speaker - Matthew Chiodi - The hole in your Zero Trust strategy - unmanageable applicationsSpeaker - Anil Karmel - Can you “Shift Left” Compliance?Speaker - Brandon Pugh - Legislative and Regulatory Developments in the United StatesSpeaker - Andang Nugroho - Private Cloud Implementation
11
12:5012:5517:5017:55Break
12
12:5513:1017:5518:10Speaker - Emmanuel Nicaise - No cyber without humans: How your organisational culture can boost or crippled your cybersecurity.Henry Frith - Votiro - How to Secure Data by Sanitizing Weaponized FilesSpeaker - Jose Lagdameo - Vulnerability strategies from the trenches
13
13:1013:1518:1018:15Break
14
13:1513:3018:1518:30Speaker - Stan Mierzwa - Implementing Technology in Low-Resource Settings and Considerations for Information SecuritySpeaker - Philipp Reisinger - Risk perception and human (ir)rationality Speaker - Kanishka Yapa - Threats and Mitigations in Medical Internet of ThingsSpeaker - Utsave Mittal - Capacity building in cyber security
15
13:3013:353:0518:35Break
16
13:3513:5018:3518:50Speaker - Jacek Grymuza - Network Threat Hunting, so how to "hunt" for network threats?Speaker - Kellep Charles - A Practical Use of Open-Source Intelligence (OSINT)Speaker - Adewale Ashogbon - Managing the Risk of Artificial Intelligence/Machine Learning
17
13:5014:0018:5019:00Closing Remarks
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100