9:00 am - 9:10 am
ET
1:00 pm - 1:10 pm UTC | Opening Remarks |
9:10 am - 9:25 am
ET
1:10 pm - 1:25 pm UTC | Quantum Quantum Primer - Opportunities and Threats This talk will provide a foundational understanding of quantum technology, exploring its transformative potential alongside the emerging security challenges it presents. A concise introduction to quantum technology, covering both its exciting advancements and the critical security implications that must be addressed.
Show More
|
9:25 am - 9:40 am
ET
1:25 pm - 1:40 pm UTC | Quantum Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams Quantum computing threatens traditional cryptography, making proactive preparation essential. This session covers key steps, including cryptographic inventory, developing a quantum-safe strategy, and exploring hybrid approaches when a direct upgrade to PQC isn't feasible. It will also touch on QKD and other solutions for specific use cases. Attendees will gain insights from real-world lessons learned by early adopters
Show More
|
9:40 am - 9:55 am
ET
1:40 pm - 1:55 pm UTC | Quantum Post-Quantum Cryptography: Why It's Secure NIST released its first standards for PQC in August 2024, and the industry is expected to spend billions or more migrating. What are spending all this money on, exactly? Join Konstantinos for an explanation of how PQC works, why it’s safe, and what comes next.
Show More
|
9:55 am - 10:10 am
ET
1:55 pm - 2:10 pm UTC | Quantum A Field Guide to PQC Migration - Tactics, Techniques, and Procedures |
10:10 am - 10:30 am
ET
2:10 pm - 2:30 pm UTC | Break |
10:30 am - 11:00 am
ET
2:30 pm - 3:00 pm UTC | Quantum The Final Word: A Live Q&A Join us for a live Q&A as experts will dive into the current state of quantum advancements, the potential impact on industries, and the challenges that remain.
Show More
|
11:05 am - 11:20 am
ET
3:05 pm - 3:20 pm UTC | ICS/Telecomm/Threat Intell Securing Communications in the Human Supply Chain In the wake of Salt Typhoon, understanding the threat landscape of our communications is now more critical than ever. The vast amounts of data available that’s being shared and used by criminal organizations is staggering. Join me as we look at what data we know is being gathered, what technical tools and exploits are being used to weaponize it, and what governments are doing to protect themselves.
Show More
|
11:20 am - 11:35 am
ET
3:20 pm - 3:35 pm UTC | ICS/Telecomm/Threat Intell LLM SATs FTW AI has been set to revolutionize every aspect of cybersecurity in the next 6 months... for the last 3 years. Cyber Threat Intelligence is supposed to be the exact kind of high intensity knowledge work where LLMs were supposed to make human analysts obsolete. We will look at where AI systems can and can't support analysts, rather than replace them, by makign the exact techniques analysts should do, but often can't, possible.
Show More
|
11:35 am - 11:50 am
ET
3:35 pm - 3:50 pm UTC | ICS/Telecomm/Threat Intell The Robs: Fireside Chat Two cybersecurity guys named Lee walk into a bar—Rob T. with his SANS forensics toolkit and Rob M. with his Dragos ICS intel—and somehow manage to break down complex threats between whiskey pours and terrible puns. When they're not finishing each other's incident response war stories or debating who gets to be "the real Rob Lee," they're actually offering surprisingly useful insights about why attackers keep winning and what defenders might actually do about it.
Show More
|
11:50 am - 12:20 pm
ET
3:50 pm - 4:20 pm UTC | ICS/Telecomm/Threat Intell The Final Word: A Live Q&A Join us for an engaging Q&A session where our three expert speakers will break down the current threat landscape, share real-world insights, and debate the most pressing issues affecting their respective fields.
Show More
|
12:10 pm - 1:00 pm
ET
4:10 pm - 5:00 pm UTC | Lunch |
1:05 pm - 1:20 pm
ET
5:05 pm - 5:20 pm UTC | AI Sink or Swim: Riding the Rising Tide of AI Sounil Yu, Co-founder and Chief AI Safety Officer, Knostic Artificial intelligence is reshaping our world at an unprecedented pace, creating new opportunities and new threats. In cybersecurity, we are primarily focused on how attackers can use AI to cause trouble or how the business' use of AI creates new attack surfaces and governance challenges. Of course, we're also looking at how AI can help us do the practice of cybersecurity, but herein lies what may be the biggest emerging threat that we all face. Tasks that we thought were the sole territory of humans, including those in cybersecurity, are now being accomplished by machines. Jobs that we thought were safe from AI are now being displaced. How do we best stay ahead of this trend so that we can ride the rising tide?
Show More
|
1:20 pm - 1:35 pm
ET
5:20 pm - 5:35 pm UTC | AI To be announced |
1:35 pm - 1:50 pm
ET
5:35 pm - 5:50 pm UTC | AI AI security demystified AI vulnerabilities are critical because we connect AI to everything, its attack surface is enormous and we are just starting to learn how to protect it. This talk presents the AI security framework of the OWASP AI Exchange which has been integrated in ISO/IEC 27090 AI security and the security standard for the EU AI Act. This sneak peek into upcoming international standards will bring security professionals up to speed with the big picture and the latest greatest in AI security.
Show More
|
1:50 pm - 2:20 pm
ET
5:50 pm - 6:20 pm UTC | AI The Final Word: A Live Q&A Join us for a lively Q&A session as we discuss the future of AI, emerging trends, and what’s next for this revolutionary technology.
Show More
|
2:20 pm - 2:40 pm
ET
6:20 pm - 6:40 pm UTC | Break |
2:45 pm - 3:00 pm
ET
6:45 pm - 7:00 pm UTC | Cyber Defense Smart Phone Forensics Circa 2028 Smart Phone forensics has been an ever-evolving science with constantly moving goal posts - but what challenges lie in the future? Between access and encryption, privacy concerns, AI, workload balancing and a host of other issues, what will the future look like for Digital Examiners?
Show More
|
3:00 pm - 3:15 pm
ET
7:00 pm - 7:15 pm UTC | Cyber Defense Vulnerability Chaining in the Age of AI Vulnerability Chaining continues to be an emerging threat across our complex IT/OT landscapes. With the advent of AI and extended use of ML and LLM's, vulnerability chaining identification and remediation becomes even more complex. Come learn about the complexities of AI use in various environments and what that means to evaluating chained vulnerabilities in your environment.
Show More
|
3:15 pm - 3:45 pm
ET
7:15 pm - 7:45 pm UTC | Cyber Defense The Final Word: A Live Q&A Join us for a live Q&A where Ian and Nikki share their insights on the current state of cyber defense, discuss key challenges, and explore the most effective strategies for defending against today’s sophisticated attacks.
Show More
|
3:45 pm - 4:00 pm
ET
7:45 pm - 8:00 pm UTC | Closing Remarks |