Agenda October | Hawaii

The Turtle Bay Resort | Oahu Hawaii | October 2023

Sunday, October 1st 2023

Arrivals to Honolulu with transportation to the Turtle Bay Resort.

Scheduled Transportation | Pick-up from Honolulu Airport

Scheduled Transportation | Pick-up from Honolulu Airport

  • October 1, 2023
7:00 AM-11:55 PM
Honolulu Airport (HNL)
October 1, 2023
11:30 AM

Hosted Attendee Lunch

  • 11:30 AM
11:30 AM-1:00 PM
Main Banquet Hall

Hosted Dinner Session

  • 6:00 PM-8:00 PM
6:00 PM-8:00 PM
Main Banquet Hall
6:00 PM-8:00 PM
7:00 PM-10:00 PM
Hosted Attendee Open-Bar

Hosted Attendee Open-Bar

  • 7:00 PM-10:00 PM
7:00 PM-10:00 PM
Demo Hall

Monday October 2nd 2023

Attendee Breakfast

  • October 2, 2023

6:30 AM-8:00
Main Banquet Hall

October 2, 2023
7:00 AM-12:00 PM

Demo Hall Setup and Assembly

  • 7:00 AM-12:00 PM
Demo Hall
The Importance of Personal Branding for Cybersecurity leaders

The Importance of Personal Branding for Cybersecurity leaders

  • 10:00 AM-11:00 AM

In today's rapidly evolving digital landscape, the role of cybersecurity leaders is of paramount importance in protecting organizations from the growing threat of cyber attacks.

Stephanie Yu
Career Consultant
The Unicorn Recruiter

10:00 AM-11:00 AM
11:00 AM-11:30 AM
Four Major Cybersecurity Trust Gaps

Four Major Cybersecurity Trust Gaps

  • 11:00 AM-11:30 AM

The world is embracing digitalization, but in this era of global digital flows, companies must build robust cyber capabilities. Clear and frequent communication is essential but often lacking in companies’ cybersecurity programs. How security professionals can create tighter bonds with critical stakeholders – both across their organization and beyond.

Kapil Bareja
Advisory Cyber and Strategic Leader
Deloitte 

Attendee Lunch

Attendee Lunch

  • 11:30 AM-1:00 PM

Main Banquet Hall

11:30 AM-1:00 PM
12:00 PM-1:00 PM
The Role of Automation in Cybersecurity - and the Unseen Risks of Using It

The Role of Automation in Cybersecurity - and the Unseen Risks of Using It

  • 12:00 PM-1:00 PM

Since the introduction of ChatGPT in November of 2022, generative AI and automation have been a huge topic of discussion in boardrooms around the world. And like any new technology, there are countless possibilities for its application. 

Meghan Maneval
Director of Technical Product Management
RiskOptics 

[Keynote] How to Be a CISO That People Respect and Trust

[Keynote] How to Be a CISO That People Respect and Trust

  • 1:00 PM-2:00 PM
How to convert the challenges of culture and relationships into a strategic differentiator that powers your cybersecurity effortsTyson Martin Principal CIO, CISO, & Board Advisor Amazon Web Services (AWS)
1:00 PM-2:00 PM
2:00 PM-3:00 PM
Navigating Cyber Incidents: A Case Study on Effective Response Strategies

Navigating Cyber Incidents: A Case Study on Effective Response Strategies

  • 2:00 PM-3:00 PM

In today's interconnected world of business, cyber incidents have become a recurring challenge that organizations must face. 

Ivan Avilla
Director of Cyber Incident Response
GoDaddy

The Future of Cybersecurity

The Future of Cybersecurity

  • 3:00 PM-4:00 PM

In an era of rapid technological advancement and increasing connectivity, the future of cybersecurity presents unprecedented challenges and remarkable opportunities. 

Dennis Leber
CISO
UConn Health

3:00 PM-4:00 PM
4:00 PM-4:30 PM
Scheduled Break | Snacks | Refreshments

Scheduled Break | Snacks | Refreshments

  • 4:00 PM-4:30 PM
Main Stage
AI synthesized, polymorphic malware (BlackMamba)

AI synthesized, polymorphic malware (BlackMamba)

  • 4:30 PM-5:30 PM
Jeff Sims Principal Security Engineer HYAS
4:30 PM-5:30 PM
4:30 PM-5:30 PM
The Development of the Risk Framework

The Development of the Risk Framework

  • 4:30 PM-5:30 PM

Allan Alford
Producer and Host
The Cyber Ranch Podcast

Hosted Attendee Dining Invite | General Dining

Hosted Attendee Dining Invite | General Dining

  • 5:30 PM-8:00 PM
Networking Mixer Vendor & Executive Dining Reservations
5:30 PM-8:00 PM
7:00 PM-10:00 PM
Hosted Attendee & Vendor Networking Open-Bar

Hosted Attendee & Vendor Networking Open-Bar

  • 7:00 PM-10:00 PM
Demo Hall Networking Mixer Vendor & Executive Relationship Building

Tuesday, October 3rd 2023

Hosted Attendee Breakfast Invite | General Breakfast

Hosted Attendee Breakfast Invite | General Breakfast

  • 6:30 AM-8:00 AM
Networking Opportunity Vendors & Executives
6:30 AM-8:00 AM
8:00 AM-9:00 AM
[Keynote] Avoiding the Four Biggest Mistakes That Will Blow Up an M&A

[Keynote] Avoiding the Four Biggest Mistakes That Will Blow Up an M&A

  • 8:00 AM-9:00 AM

The industry has seen an uptick in M&A with a recession on the horizon for 2023

 

Arvin Bansal
CISO

The Importance of Soft Skills for Information Security Professionals

The Importance of Soft Skills for Information Security Professionals

  • 9:00 AM
Dwayne Stevens CIO WestCare Foundation
9:00 AM
10:00 AM-10:30 AM
Scheduled Break | Snacks | Refreshments

Scheduled Break | Snacks | Refreshments

  • 10:00 AM-10:30 AM
Dwayne Stevens CIO WestCare Foundation
AI insider recruitment: Simulate the dangers of a State-Level Adversary

AI insider recruitment: Simulate the dangers of a State-Level Adversary

  • 10:30 AM-11:30 AM

how a state-level adversary can utilize AI to identify possible corporate insiders who are vulnerable to influence


Jeff Sims
Principal Security Engineer
HYAS

10:30 AM-11:30 AM
10:30 AM-11:30 AM
How to build and maintain a diverse organization

How to build and maintain a diverse organization

  • 10:30 AM-11:30 AM

Leaders set the direction and tone for their organizations; talent management is a major responsibility.

 

Kelly Thibault
Executive Director
Secure Diversity 

How to Engage the General Population to Improve Your Security Posture

  • 11:30 AM-12:30 PM

Attendees will learn how to engage the general population of their organization to make meaningful contributions towards the organization's security posture.


Beau Monday
CISO
Punahou School

11:30 AM-12:30 PM
12:30 PM-2:00 PM
Hosted Attendee Lunch Invite | General Lunch

Hosted Attendee Lunch Invite | General Lunch

  • 12:30 PM-2:00 PM
Networking of Lunch with Vendors and Executives
Winning friends and influencing people, with stories of the world around us.

Winning friends and influencing people, with stories of the world around us.

  • 1:00 PM-2:00 PM

Nathan Case
Security Advocate
Datadog

1:00 PM-2:00 PM
2:00 PM-3:00 PM
Untangling the Challenge of Risk Quantification

Untangling the Challenge of Risk Quantification

  • 2:00 PM-3:00 PM

There is very little consensus in our industry around risk quantification of cyber threats. 

Chris Patteson
CTO/CISO
The FRONTdoor Collective 

From Business Email Compromise to ChatGPT: The Evolution of Cybercrime

From Business Email Compromise to ChatGPT: The Evolution of Cybercrime

  • 3:00 PM-4:00 PM

Business Email Compromise (BEC) is one of the most common forms of cybercrime, with criminals using social engineering techniques to trick employees into transferring funds or divulging sensitive information.


Xavier Ashe
SVP, Cyber Defense
Truist

3:00 PM-4:00 PM
4:00 PM-5:00 PM
AI driven, spear phishing campaigns (highly realistic and targeted per executive)

AI driven, spear phishing campaigns (highly realistic and targeted per executive)

  • 4:00 PM-5:00 PM

AI-enabled cyber attack is no longer just a future possibility, it's now a near term reality.


Jeff Sims
Principal Security Engineer
HYAS

Attracting and retaining the next generation of cyber talent

Attracting and retaining the next generation of cyber talent

  • 4:00 PM-5:00 PM

Thinking outside of the box when attracting & retaining NextGen talent


Angel Mosley
Corporate, Governance, Risk, & Compliance
Ryan Specialty Group

4:00 PM-5:00 PM
:00 PM-7:00 PM
Hosted Attendee Dining Invite | General Dining

Hosted Attendee Dining Invite | General Dining

  • :00 PM-7:00 PM
Networking Opportunity Vendor & Executive
[Event/Contest] Live-Fire Active Malware Tabletop Exercise

[Event/Contest] Live-Fire Active Malware Tabletop Exercise

  • 7:00 PM-10:00 PM
This is a uniquely cultivated live malware environment hosted on a virtual network to simulate part of the standard enterprise environment.

The executives are encouraged to work in groups and have the option to work with vendors who sponsored a tool for use in this exercise.

Executives: Working with peers and vendors will greatly speed up the process.  The vendors sponsoring tools for use have not been provided any advantage or insight. If you like the way their tool works, consider engaging the vendor in a POC.

Vendors: You are encouraged to bring engineers to join this event. The executives will see how well your tools work in an incident. This tabletop exercise provides a real-life scenario that you are personally able to demo and concisely show the executives why you should be included in their current toolset.

7:00 PM-10:00 PM
7:00 PM-10:00 PM
Hosted Attendees Open-Bar

Hosted Attendees Open-Bar

  • 7:00 PM-10:00 PM
Networking, Evening Air, Enjoy, Relaxing, Building Friendships