Summary

AGENDA OVERVIEW
Pre-Summit Workshop: June 3
 
8:00 AM Grand Ballroom Registration Desk Pre-Summit Registration Open All Day
 
8:00 AM Grand Ballroom, Salons F & G Foyer Breakfast
 
9:00 AM Grand Ballroom, Salons F, G, H, J, & K Welcome and Introduction to Incident Response
 
10:00 AM Grand Ballroom, Salons F, G, H, J, & K Incident Response Table-Top Exercise 
 
12:00 PM Grand Ballroom, Salons F & G Foyer Networking Lunch
 
1:00 PM Grand Ballroom, Salons F, G, H, J, & K Building an Incident Response Plan
 
2:00 PM Grand Ballroom, Salons F, G, H, J, & K Incident Handling Tips
 
3:30 PM Grand Ballroom, Salons F, G, H, J, & K Post-Incident Handling
 
4:30 PM Grand Ballroom, Salons F, G, H, J, & K Q & A and Wrap-up
 
4:00 PM Grand Ballroom Registration Desk Registration Open for Tuesday/Wednesday
 
5:00 PM Sky View, 1st floor Networking Reception
 
Summit Day 1: June 4
 
7:30 AM Arlington Reg Desk Registration Open
 
8:00 AM Arlington Ballroom Breakfast
 
9:00 AM Grand Ballroom Salons F, G, H, J & K Keynote: William Evanina Discusses Cybersecurity, followed by Q&A
 
10:15 AM Exhibit Hall Break
 
11:00 AM
Senior Management Large Firm

Salon I
Growing Your Security Team
 

Dedicated Security Professionals

Salon II
Tips & Tools in Malware Reverse Engineering
 

IT Leaders with Modest Resources

Salon V
Leverage These Free Resources to Up Your Security and Governance Game
 

General Track

Salon VI
Mock a Hack by Using Social Engineering or the "Touchless Hack"
 
12:00 PM Networking Lunch in the Exhibit Hall
 
1:15 PM
Senior Management Large Firm

Salon I
Developing a Culture of Security
 

Dedicated Security Professionals

Salon II
DLP: What is Everyone Doing?
 

IT Leaders with Modest Resources

Salon V
Incident Response with Modest Resources
 

General Track

Salon VI
Microsoft Security Overview and Update
 
2:15 PM Exhibit Hall Break
 
2:45 PM
Senior Management Large Firm

Salon I
DevSecOps Deconstructed
 

Dedicated Security Professionals

Salon II
You Haven’t Considered Privileged Access Management?
 

IT Leaders with Modest Resources

Salon V
You Haven’t [yet] Implemented Need to Know Access?
 

General Track

Salon VI
Phishing and Beyond: Educating your Users with Impact
 
3:45 PM Exhibit Hall Break
 
4:15 PM
Senior Management Large Firm

Salon I
The Role and Importance MSSP's and Security Partnerships Play in Security Operations
 

Dedicated Security Professionals

Salon II
Secure Your Vendor: Must- Have Vendor Controls Presented by the LS-ISAO
 

IT Leaders with Modest Resources

Salon V
Email Risks and Remedies in the Stack 2.0
 

General Track

Salon VI
Ethical Hacker Gives a Demo
 
5:15 PM Reception in the Exhibit Hall
 
Summit Day 2: June 5
 
8:00 AM Arlington Reg Desk Registration Open
 
 
9:00 AM
Senior Management Large Firm

Salon I
Governance Roundtable
 

Dedicated Security Professionals

Salon II
Threat Intelligence - Mining the Dark Web
 

IT Leaders with Modest Resources

Salon V
Micro-Perimeter/Micro- Segmentation
 

General Track

Salon VI
Take Away the Hackers’ Advantage in Realtime!
 
10:00 AM Exhibit Hall Break
 
10:30 AM
Senior Management Large Firm

Salon I
Strategies and Importance for Developing the Proper Data Classifications for your Organization
 

Dedicated Security Professionals

Salon II
Automating and Standardizing Client Audit Requests and RFP Responses on Information Security
 

IT Leaders with Modest Resources

Salon V
Supporting Incident Response and Responding to Suspected Compromised Systems on your Network
 

General Track

Salon VI
How to Sell the Importance of Information Security and Governance to Your Organization
 
11:30 AM Networking Lunch in the Exhibit Hall
 
1:00 PM
Senior Management Large Firm

Salon I
Protecting Your Firm from Insider Threats
 

Dedicated Security Professionals

Salon II
Crawling your Network to Auto-Classify HIPAA, GDPR and Other Data Subject to Regulatory Control
 

IT Leaders with Modest Resources

Salon V
Implementing the First Five CIS Controls
 

General Track

Salon VI
Security Audits: Lots of Pain. Any Gain?
 
2:00 PM Exhibit Hall Break
 
2:30 PM
Senior Management Large Firm

Salon I
Managing, Securing and Retaining Emails Was Hard Enough…
 

Dedicated Security Professionals

Salon II
SOAR and Other Emerging Technologies
 

IT Leaders with Modest Resources

Salon V
IT Leaders with Modest Resources Roundtable
 

General Track

Salon VI
Ethical Hacking Tools
 
3:30 PM Wrap Up
 

STAY CONNECTED

#LegalSEC19