October 30–31, 2016: Training
October 31–November 2, 2016: Tutorials & Conference
New York, NY

Personal schedule for Kennis Koldewyn

Download or subscribe to Kennis Koldewyn's schedule.

8:15am–8:45am Tuesday, 11/01/2016
Location: Trianon Foyer, 3rd Floor
Gather before keynotes on Tuesday morning for a speed networking event in the Trianon Ballroom foyer. Enjoy casual conversation while meeting other attendees. Read more.
9:00am–9:05am Tuesday, 11/01/2016
Location: Grand Ballroom
Courtney Nash (O'Reilly), Allison Miller (Google)
Program chairs Courtney Nash and Allison Miller open the first day of keynotes. Read more.
9:05am–9:40am Tuesday, 11/01/2016
Location: Grand Ballroom
Heather Adkins (Google)
“Those who cannot remember the past are doomed to repeat it.” — George Santanaya, The Life of Reason We’ll time travel through various events in security history and come to understand how we need to alter our course to change the future. Read more.
9:40am–10:05am Tuesday, 11/01/2016
Location: Grand Ballroom
Richard Thieme (ThiemeWorks)
This talk is about reality - the real facts of the matter and strategies needed for effective life-serving responses, a way to manage the paradoxical imperatives and identity-threatening pressures of our lives and work. Read more.
10:05am–10:40am Tuesday, 11/01/2016
Location: Grand Ballroom
Becky Bace (CFITS, University of South Alabama)
Cybersecurity is a hot topic today. Rebecca Bace explains what we need to do to consolidate our efforts in this area, in hopes of instigating a new generation of cybersecurity. Read more.
10:40am–10:45am Tuesday, 11/01/2016
Location: Grand Ballroom
Program chairs Courtney Nash and Allison Miller close the first day of keynotes. Read more.
11:20am–12:00pm Tuesday, 11/01/2016
Security in context (security datasci)
Location: Rendezvous Trianon
Jay Jacobs (BitSight Technologies)
Jay Jacobs dives into data from tens of thousands of organizations and shares techniques that pick out the relationships and identify patterns of risky behavior—once we start to find these indicators, we can actually test and prove what separates good from the mediocre when it comes to security. Read more.
12:00pm–1:15pm Tuesday, 11/01/2016
Location: Americas Hall 1
During lunch, you'll have the chance to participate in a Birds of a Feather session with like-minded people. Read more.
1:15pm–1:55pm Tuesday, 11/01/2016
The human element
Location: Grand Ballroom West Level: Non-technical
Lance Hayden (ePatientFinder)
Lance Hayden introduces Security FORCE, a model adapted from research on high-reliability organizations (HROs). HROs thrive in dangerous and uncertain environments through a culture that emphasizes failure, operations, resilience, complexity, and expertise. The FORCE model applies these traits to cybersecurity operations and provides metrics to support successful enterprise FORCE adoption. Read more.
2:10pm–2:50pm Tuesday, 11/01/2016
Tools and processes
Location: Trianon Ballroom Level: Intermediate
Bruce Potter (KEYW Corporation)
Performing a security risk analysis and documenting remediation actions is a critical step in every organization's security program. Unfortunately, there is no one single way to perform a risk analysis, and determining a process can be intimidating to new comers. Bruce Potter presents a simple assessment process that you can readily utilize to perform a risk assessment in your organization. Read more.
3:50pm–4:30pm Tuesday, 11/01/2016
Tools and processes
Location: Trianon Ballroom Level: Beginner
Lenny Zeltser (SANS Institute)
If you're responding to a malware incident, you need to quickly derive relevant and actionable information about the malicious program and the context within which it was employed. Lenny Zeltser explains how to gather such open source intelligence. You'll expand your incident response skill-set and learn how to turn public data about adversaries and malicious programs into useful details. Read more.
4:45pm–5:25pm Tuesday, 11/01/2016
Bridging business and security
Location: Mercury Ballroom Level: Non-technical
Andrea Limbago (Endgame)
Humans are thought to be the weakest link in security, but this is not security’s only human challenge. Andrea Limbago explains why organizations must increasingly leverage a range of social science approaches and insights—from the C-suite translation gap to greater diversity to geopolitical insights to automated data analysis—to navigate the leading workforce challenges today and in the future. Read more.
9:00am–9:05am Wednesday, 11/02/2016
Location: Grand Ballroom
Allison Miller (Google), Courtney Nash (O'Reilly)
Program chairs Allison Miller and Courtney Nash open the second day of keynotes. Read more.
9:05am–9:35am Wednesday, 11/02/2016
Location: Grand Ballroom
Suzanne Vautrinot (Major General, US Air Force, Retired)
Suzanne Vautrinot explores the shift as the private sector moves to "positive" leadership and as individuals, corporations, and governments increase the magnetic strength of their demand for information and cybersecurity solutions. The sky is not the limit—the need for your innovative ideas is universal. Read more.
9:35am–10:05am Wednesday, 11/02/2016
Location: Grand Ballroom
Michael Walker (DARPA)
Michael Walker offers an overview of DARPA’s Cyber Grand Challenge (CGC), a global contest to develop first-generation autonomous cyber defense systems over an aggressive two-year competition timeline, and explains why the automation pioneered at CGC challenges conventional wisdom about the structural advantages of cyberattack and is poised to change the way we defend the code that runs our world. Read more.
10:05am–10:10am Wednesday, 11/02/2016
Location: Grand Ballroom
The O'Reilly Defender Awards recognize individual contributors who have demonstrated exceptional leadership, creativity, and collaboration in the defensive security field. The winners of the O'Reilly Defender Awards will be announced at this time. Read more.
10:10am–10:40am Wednesday, 11/02/2016
Location: Grand Ballroom
Cory Doctorow explains how EFF is battling the perfect storm of bad security, abusive business practices, and threats to the very nature of property itself, fighting for a future where our devices can be configured to do our bidding and where security researchers are always free to tell us what they've learned. Read more.
10:40am–10:45am Wednesday, 11/02/2016
Location: Grand Ballroom
Program chairs Allison Miller and Courtney Nash close the second day of keynotes. Read more.
11:20am–12:00pm Wednesday, 11/02/2016
Bridging business and security
Location: Mercury Ballroom Level: Beginner
Allan Liska (Recorded Future), Timothy Gallo (Symantec)
The best way to stop ransomware is to prevent it from ever executing within an environment, but protecting against most ransomware doesn't necessarily involve increasing security spending. Allan Liska and Timothy Gallo offer a practical guide to preventing ransomware, primarily using tools that are already available in most networks. Read more.
12:00pm–1:15pm Wednesday, 11/02/2016
Location: Americas Hall 1
During lunch, you'll have the chance to participate in a Birds of a Feather session with like-minded people. Read more.
1:15pm–1:55pm Wednesday, 11/02/2016
Security in context (security datasci)
Location: Trianon Ballroom Level: Beginner
Kyle Ehmke (ThreatConnect)
Kyle Ehmke draws on information identified in ThreatConnect research on the Anthem hack to demonstrate how an organization can leverage threat intelligence in conjunction with domain registration data to further bolster its defensive efforts and details the process by which ThreatConnect identified potential Chinese APT activity against the pharmaceutical sector. Read more.
2:10pm–2:50pm Wednesday, 11/02/2016
Bridging business and security
Location: Mercury Ballroom Level: Intermediate
Timothy Sandage (Amazon Web Services)
Cloud computing is becoming the new normal. The question is no longer, if? It’s, how fast can we move and what are we going to move first? Timothy Sandage offers an overview of "secure by design" principles and shows how an AWS environment can be configured to provide a reliable operational security control capability across multiple industry verticals. Read more.
3:50pm–4:30pm Wednesday, 11/02/2016
The human element
Location: Rendezvous Trianon Level: Beginner
Fernando Montenegro (Independent)
Common security issues, such as user and software security or cybercrime, are affected by underlying economics—information asymmetry, market failures, cognitive biases, and so on. Thus, addressing security issues requires understanding how they can be seen as economics problems. Fernando Montenegro offers an overview of economics concepts and their application to cybersecurity. Read more.
4:45pm–5:25pm Wednesday, 11/02/2016
Security in context (security datasci)
Location: Trianon Ballroom Level: Intermediate
' grecs (NovaInfosec Consulting)
In the aftermath of the fall of Evernote as an inexpensive threat intel platform, low-cost solutions have awoken from the remains to give hope to defenders everywhere. S. Grec continues his threat intel series, covering lessons learned from his Evernote experiment before pivoting toward improved data structures and newly discovered enterprise-friendly intel platforms to support them. Read more.