Event Schedule

January 20, 2018

Day 1
Registration / Coffee
Atrium / Hound Square

An arrangement of fresh fruit and granola bars will be provided.

Opening Remarks
  • Dr. Richard Lovely John Jay College

  • Quiessence Phillips The City of New York

Keynote
  • Runa Sandvik The New York Times

Keynote
  • Amber Baldet JPMorgan

Practical Analysis of Awareness
  • Kendra Cooley MailChimp

Hunting for Lateral Movement
  • Mauricio Velazco

Return Oriented: A 2017 Market Round Up
  • Kelly Shortridge


The Things No One Tells You About Launching a Startup
  • Loren Mahler Dealy Mahler Strategies

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

Open Up and Say 0x41414141: Attacking Medical Devices
  • Robert Portvliet Cylance

Evading C2 Detection with Asymmetry
  • Brandon Arvanaghi Gemini

  • Andrew Johnston Mandiant

Creating a New Security Product Category
  • Galina Antova Claroty


Bootstrapping
  • Paul Vixie Farsight Security

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

Lunch Break
Hound Square

A complimentary lunch will be provided.

Threat hunting .NET malware with YARA
  • Santiago Pontiroli Kaspersky Lab Latin America

Moving Graph Analytics to Higher Dimensions to Discover Network Activity / Anomalies that are implicit in behavior - Connections in High Dimensions
  • Richard Lethin Reservoir Labs

Venture Capital in Security
  • Roselle Safran Rosint Labs & EIR at Antecedent Ventures


Marketing and Advertising for Security Startups
  • Nicole Enslein Sublime Communications

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

firewalls-- threat or menace?
  • Paul Vixie Farsight Security

Moving like a Spook through Walls Or how to be only a shadow for APT detectors
  • Dmitry Bestuzhev Kaspersky

Startup Panel
  • Lenny Zeltser Minerva Labs

  • Mikala Vidal Uplevel Security

  • Omri Segev Moyal Minerva Labs

  • Regine Gilbert

  • Joe Bernik McAfee

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

Threat-Based Risk Management
  • Julian Cohen Automatic Playbook Testing

  • Justin Berman Zenefits

Taste the Rainbow
  • David Hartley MWR InfoSecurity

Growing & Monetizing Your Open Source Side Project
  • Kevin Chung CTFd


Sales: How long until you really need it?
  • Adrian Mahieu Cortex Insight

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

Break
Hound Square

Coffee, beverages and fresh baked goods will be provided.

I Want To Break Free
  • Stuart Morgan MWR InfoSecurity

The Politics of Intelligence: Applying History to Modern Day Cyber Threat Intelligence
  • Paul Jaramillo CrowdStrike

How Security Startups Can Help Build the Next Generation of Cyber Security Leaders
  • Jessica Santana New York On Tech


Product Management of Security Solutions
  • Lenny Zeltser Minerva Labs

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

2FA was part of the solution, now it's part of the problem
  • Roel Schouwenberg The Celsus Advisory Group

Signal Safari: Investigating RF Controls with RTL-SDR
  • Katie Knowles MWR InfoSecurity

(From) Concept to Profit
  • Ryan Young Atlantic IT Group


Startup Security Research
  • Irena Damsky ThreatSTOP

  • Omri Segev Moyal Minerva Labs

  • Lock Pick

  • Electronics Workshop

  • Embedded Exploitation

  • Capture the Flag

  • Visual CTF

  • Mesh Networking

Closing Remarks
L.63
After Party
336 W 37th St. Suite 1080 (10th floor), New York, NY 10018