Time HouSecCon v9 – April 9, 2019 Agenda
8:40 AM Opening
9:00 AM – 9:45 AM Keynote – Chris Roberts (Main Ballroom)
Track 1 Track 2 Track 3 – ICS Track
10:00 AM – 10:45 AM Josh Burgess – Predicting Instead of Stopping the Attack Phillip Wylie – The Pentester Blueprint: A Guide to Becoming a Pentester Jason Nations – What was the problem What was done, and What business value resulted, quantified in economic terms as much as possible.
11:00 AM – 11:45 AM John Cook – Identifying people in supposedly deidentified data Asif Awan – Containers to Functions and Beyond: A New Approach to Visibility and Protection Chris Humphreys – Compliance Considerations for Cloud Migrations and how to bridge the gap
11:45 AM – 1:00 PM Lunch
12:00 PM – 12:45 PM Chloe Messdaghi – How to Fix the Diversity Gap in Cybersecurity (Lunch Session)
1:00 PM – 1:45 PM Ernie Martinez – Canary Modeling: Validating your Security Tools in the Cloud John Dickson – AppSec in a World of Digital Transformation Steven Romero – Building Resilient SCADA Network Infrastructure
2:00 PM – 2:45 PM Spencer Koch – Offensive Security Transformation – Starting from Scratch Fred D Avila – How can you protect your users when they are compromised? Tom Van Norman – Securing OT Environments
3:00 PM – 3:45 PM Dan Cornell – Enumerating Enterprise Attack Surface A. Page Glave – 0 to Splunk in 60 Days – Security Edition Seth Jaffe – Securely Controlling 400,000 sensors – Incident Response Lessons from NASAs Mission Control
4:00 PM – 4:45 PM James Dietle – Building the badge- How you can make small, cheap and custom hardware for function or fashion Andrew Hay – Make Your Organization 10% More Secure Cecil Pineda – Zero to Hero: Building a Critical Cyber Security Program from the Ground Up
5:00 PM – 6:15 PM Happy Hour
6:30 PM Hacker Jeopardy (Main Ballroom)
Time HouSecCon v9 – April 10, 2019 Agenda
Track 1 Track 2 Track 3 – ICS Track
9:00 AM – 9:45 AM Pierluigi Stella – Making A Case For Having a Cybersecurity Budget Bruce Potter – Oh Noes! – Role Playing Your Way to Better Incident Response Clint Bodungen – What is Consequence-Driven Risk Management? Why Should You Do It, and How.
10:00 AM – 10:45 AM Liz Tesch – Splunking Azure – Getting (Your Data) There is Half the Fun Justin Fier – Beyond the Hash: Unsupervised Machine Learning and the Power of JA3 Mark Stacey – ICS Threats Year in Review
11:00 AM – 11:45 AM Josh Sokol – Conducting Table Top Exercises to Get Your Team Battle Ready Tony Bradley – Don’t Believe the Hype (Spoiler Alert: It’s All Hype) Bryan Singer – Lies, Damn Lies, and Risk Mitigation The Need for Operational Cybersecurity
11:45 AM – 1:00 PM Lunch
12:00 PM – 12:45 PM Keli Hay – Working for a living (Lunch Session)
1:00 PM – 1:45 PM Andy Bennett – So you went to the cloud (or are thinking about it really, really, hard) now what? Stephen Cravey – Elicitation, manipulation, coersion, and countermeasures Michael Radigan – Cost Effective ICS Cyber Risk Management
2:00 PM – 2:45 PM Justin Hutchins – Warfare on the Social Web Jason Robohm – Is Your Data’s Blind Side Making You Vulnerable? Art Conklin – Why we need the Purdue Mode in OT
3:00 PM – 3:45 PM Ben Brown – More Than Tor: Shining a Light on Different Corners of the Dark Web Charlie Bollom – INTEGRATED SECOPS & NETOPS: Leveraging shared data and tooling to optimize end-user experience, security posture, and overall IT productivity Bryson Bort – The I-IOT Threat Landscape
4:00 PM – 4:45 PM Lauren Neely – The EU, California, and now Washington? A Survey of the Data Privacy Landscape for 2019 Sam Denard – Static Analysis: Letters From The Front Keirsten Brager – Building a Business Case for Your ICS Security Monitoring Strategy
5:00 PM – 5:45 PM Closing Keynote – Ira Winkler (Main Ballroom)