Blockchain and Cryptocurrency Strategic Initiatives |
Jonathan Hard Sonia Mundra |
Von Braun Center - North Hall Salon 2 |
Wednesday 2:15 p.m. - 3:00 p.m. |
|
Practical Regulatory-Focused DevSecOps |
Trevor Vaughan |
Von Braun Center - South Hall | Ballroom 2 |
Thursday 3:15 p.m. - 4:00 p.m. |
|
Automated Compliance with the System Integrity Management Platform |
Trevor Vaughan |
Von Braun Center - South Hall | Stage 2 |
Wednesday 10:45 a.m. - 11:00 a.m. |
|
True Cyber Crime Story: Blocking a Nation-State Attack |
Byron DeLoach |
Von Braun Center - South Hall | Ballroom 1 |
Wednesday 1:15 p.m. - 2:00 p.m. |
|
Phishing Naked – Merging Big Data and Behavioral Risk Analysis to Demystify Phishing and Derive Actional Behavioral Risk Intelligence |
Joshua Crumbaugh |
Von Braun Center - North Hall | Salon 3 |
Wednesday 1:15 p.m. - 2:00 p.m. |
|
UAV Assisted RF Spectrum Analysis |
Randall Cottrell |
Von Braun Center - North Hall Salon 2 |
Wednesday 3:15 p.m. - 4:00 p.m. |
|
SS7 for INFOSEC |
Paul Coggin |
Von Braun Center - South Hall | Ballroom 1 |
Wednesday 2:15 p.m. - 3:00 p.m. |
|
Rise of the Virtual CISO |
Greg Schaffer |
Von Braun Center - North Hall Salon 2 |
Wednesday 1:15 p.m. - 2:00 p.m. |
|
Privacy Developments for the Security Professional |
Paige Boshell |
Von Braun Center - South Hall | Ballroom 2 |
Wednesday 3:15 p.m. - 4:00 p.m. |
|
Cyber Securing ICS - Architecture-Based Approaches that Preserve Operational Integrity |
Chris Guo Ph.D. |
Von Braun Center - South Hall | Meeting Room 2 |
Wednesday 1:15 p.m. - 2:00 p.m. |
|
Fact vs Fiction ICS Cyber Attacks |
Rob Lee |
|
|
|
Getting Rural Students ExCIITED About Cybersecurity |
SueAnne Griffith |
Von Braun Center - South Hall | Stage 1 |
Wednesday 10:15 a.m. - 10:30 a.m. |
|
Exploiting COM for Advanced Persistence |
Shawn Edwards Sean Hopkins |
Von Braun Center - North Hall | Salon 3 |
Thursday 2:15 p.m. - 3:00 p.m. |
|
.NET Hacking and In-Memory Malware |
Shawn Edwards |
Von Braun Center - North Hall | Salon 3 |
Thursday 3:15 p.m. - 4:00 p.m. |
|
Urban Engine |
Toni Eberhart |
Von Braun Center - South Hall | Stage 1 |
Wednesday 10:45 a.m. - 11:00 a.m. |
|
Threat Hunting using Open Source Tools |
Rita Edwards |
Embassy Suites - Redstone Boardroom |
Tuesday 9:00 a.m. - 4:00 p.m. |
|
4 Ways to Assess Device Integrity |
Robert Rounsavall |
Von Braun Center - North Hall Salon 2 |
Thursday 2:15 p.m. - 3:00 p.m. |
|
RF Hacking an "Amazon's Choice" Security System |
Tom Sutherland Hans Schantz Jake Schneider |
Von Braun Center - North Hall | Salon 3 |
Wednesday 4:15 p.m. - 5:00 p.m. |
|
The Cyber Challenge - Keeping Skills Up to Date |
Peter Weishaar |
Von Braun Center - South Hall | Stage 2 |
Thursday 2:30 p.m. - 2:45 p.m. |
|
Agile Cybersecurity Education: Evolving Demands in the Cyber Landscape |
Dr. David Schippers |
Von Braun Center - South Hall | Meeting Room 2 |
Thursday 1:15 p.m. - 2:00 p.m. |
|
Using Threat Intelligence to Augment your SOC Security Stack |
Eric Monterastelli |
Von Braun Center - South Hall | Stage 2 |
Wednesday 1:30 p.m. - 1:45 p.m. |
|
Plant Floor Cybersecurity Challenges |
Chris McLain |
Von Braun Center - South Hall | Stage 1 |
Thursday 3:15 p.m. - 4:00 p.m. |
|
Cybersecurity Breach Trends |
Jason Asbury |
Von Braun Center - South Hall | Stage 2 |
Wednesday 4:00 p.m. - 4:15 p.m. |
|
Redstone Test Center’s Weapon Centric Cyber Test Capability |
David Elkins |
Von Braun Center - South Hall | Meeting Room 2 |
Wednesday 4:15 p.m. - 5:00 p.m. |
|
Keynote Presentation by Naomi Lefkovitz |
Naomi Lefkovitz |
Von Braun Center - North Hall 2-3 |
Thursday 11:45 a.m. - 1:00 p.m. |
|
Keynote Presentation by Vicki Michetti |
Vicki Michetti |
Von Braun Center - South Hall | Ballroom 3 - 5 |
Thursday 9:00 a.m. - 9:45 a.m. |
|
Secure and Assured Client to Cloud Solution |
Thomas Proue Robby Ann Carter |
Von Braun Center - South Hall | Stage 1 |
Wednesday 1:30 p.m. - 1:45 p.m. |
|
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level |
Adam Alexander Paul Graham Eric Jackson Bryant Johnson Jaehong Park Tania Williams |
Von Braun Center - North Hall | Salon 1A |
Wednesday 3:15 p.m. - 3:35 p.m. |
|
Improving the Efficiency of a Cyber Competition through Data Analysis |
Steven Day Amanda Joyce |
Von Braun Center - North Hall | Salon 1A |
Wednesday 4:15 p.m. - 4:35 p.m. |
|
Developing and Implementing a Cybersecurity Course for Middle School |
Hillary Fleenor Dr. Yesem Kurt Peker |
Von Braun Center - North Hall | Salon 1A |
Thursday 1:15 p.m. - 1:35 p.m. |
|
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions |
Bradford Love Dan Kim Sanghun Kim |
Von Braun Center - North Hall | Salon 1A |
Thursday 1:35 p.m. - 2:00 p.m. |
|
A Cloud Based Sandbox Entitlement Granting Engine |
Austin Cottrill David Krovich Daniel Mancini |
Von Braun Center - North Hall | Salon 1A |
Thursday 2:15 p.m. - 2:35 p.m. |
|
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory-based Mitigation Approach |
Professor Kim-Kwang Raymond Choo Alan Roder |
Von Braun Center - North Hall | Salon 1B |
Wednesday 2:15 p.m. - 2:35 p.m. |
|
Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems |
SueAnne Griffith Thomas Morris |
Von Braun Center - North Hall | Salon 1B |
Wednesday 2:35 p.m. - 3:00 p.m. |
|
An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units |
Xin Wang Wei Zhang |
Von Braun Center - North Hall | Salon 1B |
Wednesday 3:15 p.m. - 3:35 p.m. |
|
A Specification-Based Intrusion Prevention System for Malicious Payloads |
Thomas Morris Aaron Werth |
Von Braun Center - North Hall | Salon 1B |
Wednesday 4:15 p.m. - 4:35 p.m. |
|
Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks |
Rajendra Boppana Rajasekhar Chaganti Vasudha Vedula |
Von Braun Center - North Hall | Salon 1B |
Wednesday 4:35 p.m. - 5:00 p.m. |
|
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments |
Enis Golaszewski Geoffrey Herman Spencer Offenberger Linda Oliva Peter Peterson Travis Scheponik Alan Sherman |
Von Braun Center - North Hall | Salon 1B |
Thursday 1:15 p.m. - 1:35 p.m. |
|
Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM |
Michael Anderson Letha Etzkorn Mohammad Shojaeshafiei |
Von Braun Center - North Hall | Salon 1B |
Thursday 2:35 p.m. - 3:00 p.m. |
|
The impossibility of Security in I.A.M. Without Knowledge Based Input |
Steven Bryant |
Von Braun Center - South Hall | Stage 2 |
Wednesday 3:45 p.m. - 4:00 p.m. |
|
SADD: Scalable Anonymous Disposable Desktops |
Desmond Jackson |
Von Braun Center - South Hall | Stage 1 |
Thursday 2:30 p.m. - 3:00 p.m. |
|
Stopping The Click - How PeopleSec's AI Driven Security Awareness Training can Stop Phish Clicks |
Joshua Crumbaugh |
Von Braun Center - South Hall | Stage 1 |
Thursday 10:15 a.m. - 10:30 a.m. |
|
How to Build a World-Class Cybersecurity Program in the Face of Continuously Evolving Threats and a Cyber Talent Shortage |
Jerry Jenkins |
Von Braun Center - South Hall | Stage 2 |
Wednesday 4:15 p.m. - 4:30 p.m. |
|
Healthcare as a Cyber-Contested Environment |
Jeremy Blevins |
Von Braun Center - South Hall | Stage 1 |
Wednesday 4:15 p.m. - 4:30 p.m. |
|