8:30 On Site Registration and Check-in
9:00 Welcome
9:10 Lee Waskevich Leveraging Threat Intelligence to enhance Cyber Security Programs in Education
10:00 Dan Adams How Enterprise Mobility Management Programs and Technology Can Support Security While Attaining a ROI with Mobile Applications and Content Collaboration
10:50 Break
11:10 Gerard Shockley Cloud Security First at BU
12:00 Lunch
13:00 Renault Ross The Key Capabilities of Today’s Cyber Bounty Hunter
13:50 Roy Wattanasin and Ming Chow Computer Science’s Curricula Failure – What to do now?
14:30 Break
14:45 Pat Cain Finding Little Things In Big Data
15:35 Justin Pagano and Julian DeFronzo Breaking Out of the Silo: The Need for Broad Security Automation
16:15 Closing