- Todd Chamberlain, Founder/CEO, Medblox
(Friday) What the fork?! Let’s start with ‘Y’
Topic: Blockchain applications in healthcare - Cherie Burgett, Director of Operations, Global Mining and Metals ISAC
(Saturday) Finding Your Place in Cyber Security - Michael Daugherty, CEO LabMD
(Saturday) The Penny Took A Decade To Drop: How LabMD Beat The FTC and What We Learned After The Case - Angela Dogan, Director of Vendor Risk & Compliance Services, Lynx Technology Partners
(Friday) Risk Management: The Good, The Bad, The Ugly - Jonathan Dreasler, Security Manager, RSM
(Saturday) The Cybersecurity Underground - J.D. Henry, Region VII Cybersecurity Advisor for the Regional Operations Branch of the Integrated Operations Directorate, DHS/CISA
CISA Cybersecurity resources available to the Nation’s Critical Infrastructure - Brian Howell, Risk Advisor/vCISO, CyberSecurityGuide.net
(Friday) Five Questions Every Organization Should Consider Regarding Cyber Security - Kate Kuehn, CEO USA, Senseon
(Friday) How to create a comprehensive cyber culture
(Saturday) Rise of the Machine AI - Carlos Lerma, Security Architect, MARS
(Saturday) Security Architecture – The Best Existential Crisis of Your Life - Janis Mitchell, Founder/CEO, Ohio Cyber Women/Precise Resource
Introducing Young Women in Security to the entire Ecosystem of Career Choices - Charles Parker II, Adjunct Professor, University of Michigan & Thomas Edison State University
(Saturday) Risks with CAV (Connected and Autonomous Vehicles): GPS & LiDAR Attacks & Mitigations - Dr. Phil Polstra, Professor, Bloomsburg University
- William Rickert, ISU Student
(Saturday) Design and Assembly of Electronics at a budget even a student can justify - Shadrack Roberts, Chief Privacy/Security Official, US Army Sustainment Command
- Spijk Selby, Rocky Hill Forge, Bladesmith & Iron Hacker
Knife Sharpening Workshop and Display - Eugene Spafford, Professor, Purdue University and Director Emeritus, CERIAS
(Saturday Keynote) Rethinking Cyber Security - Jeff Struik, CEO/Principal Cybersecurity Engineer,
Cyber Strike Solutions, LLC
Vulnerability hunting with CHIPSEC and LuvOS - Barry Suskind, Director Enterprise Architecture, FINRA
(Friday) AV isn’t dead yet. How to better protect your enterprise with tools you already have
(Saturday) Your applications are evolving, before long you won’t have a server to protect - Tony Virelli (Byte Stealer), Owner, Emagine LLC
(Saturday Expo) Key Duplication, It’s not just for the movies
Tony will teach you how to duplicate keys from an impression - Ira Winkler, Nyotron
- Xe1phix
(Saturday) Intro to Linux file systems (workshop) - AGENDA