Start | End | Commonwealth Ballroom | Virginia Room | Other | 9:00 | Registration | 9:00 | 9:50 | Breakfast |
9:50 | 10:00 | Welcome | |
10:00 | 11:00 | Alex Hutton Keynote |
|
11:00 | 11:10 | Chris Gerling & Nick Popovich CTF Intro |
|
11:10 | 11:20 | Jamie Duncan Badge Intro |
|
11:20 | 12:10 | Adam Ely BYOD: Risks, Maturity, and Solutions |
|
12:10 | 1:00 | Lunch - James River Terrace | |
1:00 | 1:50 | Colby Clark The Digital Battlefield |
Ben Tomhave Interesting Times: Will Business Survive? |
1:50 | 2:00 | Break |
2:00 | 2:50 | Brian Lockrey Social Media Digital Forensics |
Barry Kouns Risk Assessment -- The Heart of Information Security |
2:50 | 3:00 | Break |
3:00 | 3:50 | Paul Watson Cross-Platform Network Access Control |
Dan Han SIEM implementation: What to expect |
3:50 | 4:10 | Break |
4:10 | 5:00 | Mike Shema JavaScript Security & HTML5 |
|
5:00 | 5:50 | Dan Holden DDoS & Modern Threat Motiv |
|
5:50 | 6:00 | Closing | 6:30 | 9:30 | After party hosted by Rapid7 at The Tobacco Company |
Start | End | Commonwealth Ballroom | Virginia Room | Other | 9:00 | Registration | 9:00 | 9:50 | Breakfast |
9:50 | 10:00 | Welcome | ||
10:00 | 11:00 | Chris Wysopal Keynote |
CTF | 11:00 | 11:10 | Break | CTF |
11:10 | 12:00 | Itzik Kotler Hack Like It's 2013 |
Gus Fritschie & Andrew Du How to defend against FISMA |
CTF | 12:00 | 1:00 | Lunch - James River Terrace | CTF |
1:00 | 1:50 | Daniel Ramsbrock Web Application Vulnerabilities and Solutions |
Donald Allison Observations on the (Mostly) Inadvertent Effect of Data Management on International Cybercrime Investigations |
CTF | 1:50 | 2:00 | Break |
2:00 | 2:50 | Jericho Our Straw House: Vulnerabilities |
Sean Mason A Day in the Life of an Incident Responder at a Fortune 5 |
2:50 | 3:10 | Break |
3:10 | 4:00 | Rockie Brockway Business Adaptation or: How I Learned to Stop Worrying and Love the Internet's Unclean Conflicts |
||
4:00 | 4:50 | Schuyler Towne Vulnerability Research Circa 1851 |
||
4:50 | 5:00 | Closing | 5:00 | 6:30 | Reception (at VCU) | 6:30 | TBD |