Nick KellyI CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity |
Time Schedule11:00 AM - 11:50 AM |
HallRoom 213-214 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Hall |
Dwayne McDanielWho Goes There? Actively Detecting Intruders With Cyber Deception Tools |
Time Schedule1:00 PM - 1:50 PM |
HallRoom 213-214 |
Micah BrownZero to GRC Hero |
Time Schedule2:00 PM - 2:50 PM |
HallRoom 213-214 |
Jody Ogle & Brad McGeeCyber Security Convergence, Where IT and OT meet |
Time Schedule3:00 PM - 3:50 PM |
HallRoom 213-214 |
Adam BeattyCybersecurity Certifications: Is that the Question, Vulnerability, or Exploit? |
Time Schedule4:00 PM - 4:50 PM |
HallRoom 213-214 |
Erich KronCyber Warzone: Establishing Your First Line of Digital Defense |
Time Schedule10:00 AM - 10:50 AM |
HallRoom 213-214 |
D. Cody CutrightIntroduction to Satellite Link Security Standards with CryptoLib |
Time Schedule11:00 AM - 11:50 AM |
HallRoom 213-214 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Hall |
Dwayne McDanielChampioning Security: Scaling Security At Every Level |
Time Schedule1:00 PM - 1:50 PM |
HallRoom 213-214 |
Bill GardnerLeveraging neurodiverse individuals to help fill the cyber skill shortage |
Time Schedule2:00 PM - 2:50 PM |
HallRoom 213-214 |
Chris GriffinWhat is Trust? |
Time Schedule3:00 PM - 3:50 PM |
HallRoom 213-214 |
Joshua GillilandComparing Machine Learning Algorithms for IoT Threat Detection and Prevention |
Time Schedule4:00 PM - 4:50 PM |
HallRoom 213-214 |