Table of Contents

Keynote

Your Security Program is a Horse's Ass - Ira Winkler

Artificial Intelligence

What's in your AI code? Learn why every SCA tool is wrong, and how to deal with it - Anand Sawant

Artificial Intelligence, Real Threats - Johnny X-Mas

Auto Generated Allies: Enlisting AI Support for Applied Cryptography - Pranshu Bajpai

Paste the pdf file link from setting widget.

Birthing Perjury-free AI - Charles Herring

Enterprise Engagement

Partnerships not Relationships: How to Effectively Distill Security into DevOps - Kyle Kurdziolek

The Role of Cyber Guardians: Leadership in Safeguarding the Digital Foundation - Brayden Santo

Employing a Strategic Approach to Managing Shared Supply Chain Risk - Arvin Verma

Fostering Risk Culture with a Cybersecurity Champions Network - Kyle Joerger

Paste the pdf file link from setting widget.

Geek Speak

Conti-nuum: Maximizing Threat Intel with the Conti Leak - Dan Banker

Paste the pdf file link from setting widget.

Fostering Risk Culture with a Cybersecurity Champions Network - Abby Dryer

Up Close & Personnel - Chris Carlis

Beyond the Clock: Decoding Timestomping - Abhishek Menon

Stand Up Straight - Security Posture And You - Dwayne McDaniel

Become a Super(hero) Computer – Encryption of the Future, Today - Abby Bick

Identity and Access Management

YOU are the reason your identity program is setup to fail - ギンジ🐾ターラノー

Deterring Cybercrime via a Global Cybergrid - Charles Herring

Secure Your Infrastructure with Cloud-Native PAM - Swapnil Pawar

Leadership

Getting It Done - project managing in a security world - Jezza Sutton

Leadership

Disruption Through Inclusion_ Cyber Security's Opportunity to Harness DEI - Jordan Quinn

Overcoming the Cyber Security Poverty Line - Robert Wagner