8:30 | On Site Registration and Check-in | |
9:00 | Welcome | |
9:10 | Lee Waskevich | Leveraging Threat Intelligence to enhance Cyber Security Programs in Education |
10:00 | Dan Adams | How Enterprise Mobility Management Programs and Technology Can Support Security While Attaining a ROI with Mobile Applications and Content Collaboration |
10:50 | Break | |
11:10 | Gerard Shockley | Cloud Security First at BU |
12:00 | Lunch | |
13:00 | Renault Ross | The Key Capabilities of Today’s Cyber Bounty Hunter |
13:50 | Roy Wattanasin and Ming Chow | Computer Science’s Curricula Failure – What to do now? |
14:30 | Break | |
14:45 | Pat Cain | Finding Little Things In Big Data |
15:35 | Justin Pagano and Julian DeFronzo | Breaking Out of the Silo: The Need for Broad Security Automation |
16:15 | Closing |