8:00 am - 8:00 pm
ET
12:00 pm - 12:00 am UTC | Capture the Flag KC7’s “A Day in the Life of a Threat Hunter” Ever wondered what it’s like to be a Threat Hunter? Here’s your chance! KC7’s “A Day in the Life of a Threat Hunter” CTF puts you in one of cybersecurity’s most exciting roles. Built by industry experts, this hands-on experience will have you analyzing data, uncovering hidden threats, and experiencing the real-world challenges of the hunt. Step into the action and stop adversaries in their tracks. Your journey begins here.
Show More
|
10:00 am - 10:15 am
ET
2:00 pm - 2:15 pm UTC | Opening Remarks Emily Neuens, Product Marketing Manager, Cyber Defense & New2Cyber |
10:15 am - 11:00 am
ET
2:15 pm - 3:00 pm UTC | Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths Jay James, Cybersecurity Operations Lead, Auburn University Breaking into the cybersecurity field can feel like navigating an uncharted maze—but with the right strategies, you can not only land your dream job but also accelerate your growth in the field. From an IT support role to a Cybersecurity Operations Lead, I will tell his story of his career in Higher Education Cybersecurity, and give actionable insights to help newcomers:
- Put Your Best Foot Forward: Go beyond the advice of “hands-on experience” and master the art of showcasing your potential and presenting yourself authentically.
- Become a Great Mentee: After getting a mentor, ensure you’re bringing your best self forward. Learn how to build relationships with mentors, ask the right questions, and turn advice into results.
- Be Creative with Opportunities: Learn how to lean more into non-traditional pathways and leveraging advantages that are unique to your situation.
- Excel at Networking: Understand how to build genuine connections in the cybersecurity community, use events and platforms strategically, and create a professional presence that opens doors.
Show More
|
11:00 am - 11:15 am
ET
3:00 pm - 3:15 pm UTC | Break |
11:15 am - 11:50 am
ET
3:15 pm - 3:50 pm UTC | A Day in the Life of a Network Security Engineer Faced with constant pressure to maintain the security of the organization's network infrastructures, join the world of a Network Security Engineer where every day is different and there are countless challenges to deal with. Such engagement will allow the audience get real insight of the job while focusing what network security engineers do in protecting the cyberspace with their responsibilities, tools, and techniques. The audience will appreciate the common tasks that these people do on a daily basis such as managing network streams, controlling and configuring routers, an interruption detection and response, and assisting departments with strengthening the security structures of the organization.
This session will also examine decision theory using more practical examples, analyzing such typical tasks as security incidents and how they are dealt with, how the incident control order is established, or how network security engineers manage risks in complex competitive interactions or games. These and other questions can be addressed as a result of exploring some of the familial competencies and ways of diagnosing problems so that the delegates possess the necessary skill sets for the successful performance of the role including the security matters of the organization technicality of the network communication, and analytical skills.
As for those wishing to join this domain or switch to the layer of cybersecurity, this talk will describe the way and the sorts of skills, level of certifications, and what to study. The attendees will understand thoroughly what the work of the Network Security Engineer involves on a day to day basis, and practical steps to embark on or further their journey in network security.
Show More
|
11:55 am - 12:30 pm
ET
3:55 pm - 4:30 pm UTC | A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity In this talk, John Rodriguez, CEO and Founder of Cyber Dagger LLC, takes you on a journey through the daily responsibilities, challenges, and rewards of working as a threat emulation specialist in offensive cybersecurity. Designed for newcomers to the field, this session will offer an insider's view into how emulating real-world cyber threats can help organizations strengthen their defenses.
Attendees will explore:
A Typical Day in Threat Emulation: Discover what it’s like to identify, simulate, and evaluate potential cyber threats from a defensive perspective, with real-world scenarios that illustrate the work involved.
Building Essential Skills for Success: Learn which technical and analytical skills are crucial for a role in threat emulation, along with how these skills apply to broader cybersecurity roles.
Pathways and Growth Opportunities: Uncover ways to build a career in offensive cybersecurity, with practical advice on education, certifications, and experiences that can help attendees get started and advance in the field.
Whether you're a recent graduate or making a career pivot, this talk provides a candid, practical look at a day in the life of a threat emulation specialist, equipping you with the insights to start exploring this exciting cybersecurity career path.
Show More
|
12:35 pm - 1:15 pm
ET
4:35 pm - 5:15 pm UTC | Lightning Talks Kirk Carter, Senior Cybersecurity Instructor, US Army Cyber School Jon Mann, Senior Security Engineer, Maven Clinic 11:35 – 11:45 | Navigating AI in Cybersecurity: Essential Skills As AI continues to transform the cybersecurity landscape, security professionals with a deep understanding of AI's implications have never been more critical. In this lightning talk, I will explore the journey of becoming a successful cybersecurity professional in the AI-driven security space, emphasizing that every professional in this field must be prepared to deal with both the benefits and challenges of AI. I will cover the essential skills and knowledge that have proven invaluable in my experience. Attendees will gain insights into the dual nature of AI in cybersecurity—how it can be a powerful tool for defense but also a potential vector for new types of threats. We will discuss managing the ethical implications of AI, staying ahead of adversaries who use AI for malicious purposes, and ensuring that AI systems are robust and reliable. This talk will equip you with the strategies needed to thrive in this dynamic field. Attendees will leave with a deeper understanding of the dynamic interplay between AI and cybersecurity, actionable advice to apply in their own careers, and a renewed appreciation for the critical role they play in safeguarding our digital world. Whether you are a student excited to enter the cybersecurity field or a professional looking to pivot your career, this session will provide valuable takeaways to help you excel in this ever-evolving space. 11:45-11:55 | Ever sucked into Wikipedia for three hours? CTI might be for you! Cyber Threat Intelligence (CTI) is a diverse and dynamic field that welcomes individuals from all backgrounds. Despite their differences, CTI analysts share a key trait: curiosity. If you’ve ever started reading a Wikipedia article on the nebula formation and found yourself hours later deep in the intricacies of Nagorno-Karabakh conflict, CTI might be the perfect fit for you.In this field, curiosity is not just a nice-to-have—it’s a driving force that propels analysts to explore, connect dots, and uncover patterns others might overlook. When two CTI analysts meet, their curiosity often sparks lively discussions about what “CTI” means to them. These “day-in-the-life” conversations are opportunities to compare experiences, share discoveries, and reflect on the constantly shifting landscape of cybersecurity threats. Each analyst brings a unique perspective, shaped by their organization's priorities, but all share a hunger to understand and anticipate the unknown. Some analysts work in reactive, operationally focused teams, tackling new hot threats daily and delivering timely reports or briefings to stakeholders. Others belong to proactive, strategic teams focused on long-term priorities, spending time thinking about the appetite of malicious actors for the weaknesses of their organisation and engaging other teams on preventive measures. Both approaches require a relentless curiosity and drive to ask, “How?”, "Why?" and "What if" CTI teams are a diverse place for folks with all sorts of backgrounds. Whether it's a former malware analyst dissecting attack patterns or a social sciences graduate unraveling the motivations of threat actors, every team member’s inquisitive nature fuels the collective effort. With supportive leadership and an openness to exploration, CTI becomes a space where curiosity not only thrives but transforms into support of better decisionmaking. The life of a Cyber Threat Intelligence analyst is a blend of relentless curiosity and analytical rigor, as each day brings new opportunities to unravel cyber threats and protect against adversaries who never sleep. 11:55 – 12:05 | Negating the Noise: Prioritize Your Cybersecurity Information Consumption Information overload and burnout are commonplace amongst even the most experience cybersecurity professionals. Audience will learn how to navigate the sea of information to identify the most critical pieces of information and pathways to achieve career success. The information we consume and what we talk about is ultimately what occupies our minds. By prioritizing what is relevant to our current role, our sector, and the direction we see our career going, we can get the maximum value of our information consumption, decrease the fear unknown, and doubt, and finally avoid burnout by navigating and negating the noise. 12:05 – 12:15 | Anatomy of a Cyber Attack Reading snippets about cyber attacks in the news often only reveals a small portion of the entire operation; leaving the reader to guess or imagine how it all came to pass. This leaves out the often months or years-long efforts to conduct sophisticated attacks. This talk walks us through an entire successful cyber attack. We'll outline the typical phases of an attack via the Threat Kill Chain. Then, we'll enter a familiar fictionalized world and learn how the adversary accomplishes each.
Show More
|
1:15 pm - 2:00 pm
ET
5:15 pm - 6:00 pm UTC | Lunch |
2:00 pm - 2:35 pm
ET
6:00 pm - 6:35 pm UTC | Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together Waymon Ho, Senior Security Research Manager, Microsoft (GHOST) Breaking into the world of cybersecurity can be a daunting and complex journey, but having the right guidance can make all the difference. In this panel discussion, experienced professionals will share their stories of mentorship—both as mentors and mentees—highlighting the power of mentorship in navigating the various cyberdisciplines. From building technical skills to understanding the nuances of career progression, mentorship offers invaluable insights that accelerate growth and development. Join us as we explore how to identify a mentor, establish meaningful relationships, and leverage guidance to open doors to new opportunities within cybersecurity. Whether you’re looking to break into the field or seeking to give back, this session will offer practical advice and inspiration for all stages of the cyber journey.
Show More
|
2:50 pm - 3:25 pm
ET
6:50 pm - 7:25 pm UTC | Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware A lot of people say “you don’t have to be technical to be in cybersecurity.” “But what if I want to?” one might wonder. If we start looking at a new career path with a specific goal in mind, suddenly the distant dream becomes more tangible and pursuing it becomes a matter of forging that path one step at a time.
This session will explore the practical experience of transitioning from a career with a non-technical background to one of the most technical niches of cybersecurity: reverse engineering focused on malware. It will show hands-on strategies adopted to maximize learning opportunities, build experience through independent research, and stay resilient throughout the process.
From evaluating the proverbial skills gap, to going through specific training, such as the SANS Cyber Academy, to being persistent during job hunting, to turning simple interviews into meaningful connection opportunities, this talk will show how becoming successful in a new technical career is all about the right balance between passion, hard work, and determination.
Show More
|
3:30 pm - 3:45 pm
ET
7:30 pm - 7:45 pm UTC | Break |
3:45 pm - 4:20 pm
ET
7:45 pm - 8:20 pm UTC | Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager According to the Bureau of Labor Statistics, “cybersecurity roles” are expected to experience a 32% increase from 2022 to 2032. However, in demand roles such as cybersecurity analyst, network security engineer, and penetration tester will remain highly competitive specialties for experienced mid to late career professionals. How does someone with little to no experience find a rewarding career? What does it mean to be “cyber adjacent” and what roles are available to those who are starting out or looking to pivot? How do these roles generate value? How do you stay current with trends and training, and what strategies are there to progress into cybersecurity? My New2Cyber talk will address all of these questions and more as I share my experiences and lessons learned as an IT project manager.
Show More
|
4:25 pm - 5:00 pm
ET
8:25 pm - 9:00 pm UTC | From TV news to cybersecurity: the 5 steps I took to completely change careers Looking to break into cybersecurity, but unsure where to start? In this talk, hear from a former journalist who made the switch from local TV news producer to threat intelligence analyst. Drawing from personal experience, she will cover five key strategies for landing a new role, including goal-setting, mentorship, continuous learning, strategic job hunting, and mastering the interview process.
Career changers from a variety of backgrounds, including the humanities, can play a valuable role in an organization’s cybersecurity strategy. In addition to life experience, career changers bring their own superpowers to a team, such as project management, research, writing, public speaking, and critical thinking.
Through practical advice and insights, this talk aims to inspire others considering a career shift into cybersecurity, reinforcing the idea that passion and persistence can lead to fulfilling and lucrative career paths. Participants will leave with actionable strategies and renewed confidence in their ability to break into this industry.
Show More
|
5:00 pm - 5:15 pm
ET
9:00 pm - 9:15 pm UTC | Wrap-Up |