Best Cybersecurity Conference in the Southeast

Thank you to everyone that supports this event and makes it happen!

 

A Toast To Raleigh Pre-Event
Included with your InfoSeCon Ticket
Thursday October 29, 2020
5pm – 9pm
Virtual Online Event

Win Amazing Door Prizes
Check out the prizes available to all attendees coming soon!

InfoSeCon 2020
Friday October 30, 2020
8am – 5pm
Virtual Online Event

Professional Tickets

$90

 

Student Tickets

$45

2020 Keynote Speakers

 

Ira Winkler
Keynote Speaker

Ryan Linn
Keynote Speaker

Triangle InfoSeCon is the largest annual Information Security conference in the area and is the flagship event of the Raleigh Chapter of the Information System Security Association. Our mission is simple, we want to train and educate as many people as possible about the importance of Information Security. To accomplish that mission we hold training events during our monthly meetings and we have our annual CISSP Review. In addition, we support the Cyber Patriot program that is geared toward getting high school students interested and involved in Information Security. Lastly, we provide scholarships to local schools in support of Information Security curriculums. As an organization, we believe that Information Security is both the present and the future, and it is incumbent upon us to try to influence the decision makers of today and to train the security leaders of tomorrow. This event is our premier showcase of that mission and directly funds our efforts throughout the year.

Storm CTF

Storm CTF will once again host our Capture the Flag event at InfoSeCon 2020!  The CTF will start Thursday October 29th at 6pm and run until for 24 hours.  

To access, simply find the CTF session and login to the Zoom meeting.  

We have amazing prizes this year including the following:

Click here to learn more!

Gold Sponsors         


                                               

 

Silver Sponsors

 

Bronze Sponsors

 

Agenda

Click here to view agenda

Day 1

5:00 - 5:15pm

Opening Address

Welcome from ISSA Raleigh Chapter President and our Conference Director

5:15 - 6:15pm

Keynote - Eduardo Joia - CTO Truist Financial

6:15 - 7:15pm

How to Drive Change and Manage an Effective Awareness and Training Program through a Global Pandemic

Gaylnn Fassler

Better Together: How Purple Teaming Sharpens Your Security Defenses 

Derek Rush

How to Achieve Cloud Security Monitoring at Scale 

Vinay Bansal

7:15 - 7:20pm

Session Break

Take this opportunity to visit our exhibitors and network with other attendees.

7:20 - 8:20pm

Decentralized Identity: The Future? 

Adrian Amos/David Branscome 

Web Shell Hunting - Hands On

Joe Schottman

Engineering Zero Trust Cloud Architectures

Richard Tychansky

8:20 - 8:25pm

Session Break

Take this opportunity to visit our exhibitors and network with other attendees.

8:25 - 9:25pm

Analyzing the Crime Scene: A Way for Analysts to View Security Investigations

Corey Hill

Web Shell Hunting - Hands On 

Joe Schottman

What cybersecurity professionals need to know about communicating to stakeholders, the media, and the public 

Sidd Chopra



Day 2

8:50 - 9:10am

Opening Address

Welcome from ISSA Raleigh Chapter President and our Conference Director

9:10 - 10:00am

Morning Keynote - Ryan Linn

10:00 - 10:15am

Morning Break

Take this opportunity to visit our exhibitors and network with other attendees.

10:15 - 10:35am
10:45 - 11:05am

Adopting Passwrodless Authentication for Optimum User Experience -StrongKey

Norman Field

Beyond BYOD: Bringing Your Own Office, Lessons Learned Working Remote in 2020

Charlie Mewshaw

See. Segmen. Secure. Getting Visibility into Your IoT Env. - The Teneo Group

Craig Johnson

Preventing & Detecting Cloud Security Incidents

Jeff Foresman

Applying Data Analytics for Cybersecurity 

 Nathan Kim

EPLUS

11:05 - 11:15am

Morning Break

Take this opportunity to visit our exhibitors and network with other attendees.

11:15 - 11:35am
11:35 - 11:45am
11:45 - 12:05pm

Third Party Threat Hunting

Greg Rasner

Agentless Device Security: Making the Invisible Visiable - Armis

Charlie Mewshaw, Michael Williams

Protecting Hybrid Legacy ICS Networks

Stephen Bavington

Guide Point Security 

Minimizing Your Risk Through Zero Trust - Netskope

Nathan Smolenski

12:05 - 1:20pm

Lunch, Exhibition

Grab some lunch and visit with exhibitors.

1:20 - 2:20pm

Afternoon Keynote - Ira Wrinkler

2:20 - 2:30pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

2:30 - 2:50pm
2:50 - 3:00pm
3:00 - 3:20pm

Rethinking Your Indentity Program -Sail Point

Piyush Kant, Tom Lennon

Break (10Min)

Check Point

Axonius

Disruptionware on the Rise 

Debra Baker

Red Canary

3:20 - 3:40pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

3:40 - 4:00pm
4:00 - 4:10pm
4:10 - 4:30pm

Lessons Learned and Incident Response from afar

Eva Lorenz

Current Landscape of Mid-Market Threat Intelligence

Steve Cobb

Not Another Framework : Cutting Through The Noise

Nia Lucky

Blockchain the savior

Karishman Mehta

Managing Security and Risk during COVID-19

 Nick Brezinski

Completely Security Visibility with NDR - IT Access Group

4:30 - 4:40pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

4:40 - 5:00pm
4:00 - 4:10pm
5:10 - 5:30pm

Open Source Software Compliance at the Speed of DevSecOps

Richard Tychansky

Oh, the Humanity! Social Engineering in the 21st Century

Taddy Ansink

DATA BREACHES & THE NORTH CAROLINA IDENTITY THEFT ACT

A. Mercedes Restucha-Klem

ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net

Mike Muscatell

"Anti-Forensics": Reversing a Leading Phone Forensics Tool

Matt Bergin

Ten things I wish every developer knew about security

Chris Romeo

5:30 - 6:00pm

Giveaways and Door Prizes

Take this opportunity to network with other attendees.



Day 2 - cont'd

All Day

Storm CTF

8:50 - 9:10am

Opening Address

Welcome from ISSA Raleigh Chapter President and our Conference Director.

9:10 - 10:00am

Morning Keynote - Ryan Linn

10:00 - 10:15am

Morning Break

Take this opportunity to visit our exhibitors and network with other attendees.

10:15 - 10:35am
10:35 - 10:45am
10:45 - 11:05am

Tales from the [en]Crypt

Jon Fox

Measuring Risk in 2020 -Which device will be your weakest link? - Optiv 

Shawn Taylor

Microsoft Teams Explosion: How to Prevent Data Leaks - Varonis

Break (10 min)

Cybercrime finds a way, a look at this years' cybercrime trends - Digital Shadows

Rick Holland

Balancing The Tug of War: How CIOs and CISOs Can Partner for Better IT

Scott Howitt

F5 Networks

Trend Micro

11:05 - 11:15am

Morning Break

Take this opportunity to visit our exhibitors and network with other attendees.

11:15 - 11:35am
11:35 - 11:45am
11:45 - 12:05pm

UMBRELLA (CISCO)

Optiv Silver Demo A - Session 2

Break (10 min)

ABC

Recorded Future

Break (10 min)

Cisco DUO

Seat at the Table: Security Leadership Through Tabletop Exercises

Gina Yacone

F5 Networks - cont'd

Trend Micro - cont'd

12:05 - 1:20pm

Lunch, Exhibition

Grab some lunch and visit with exhibitors.

1:20 - 2:20pm

Afternoon Keynote - Ira Wrinkler

2:20 - 2:30pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

2:30 - 3:20pm

Storm CTF - RUNS ALL DAY

2:30 - 2:50pm
2:50 - 3:00pm
3:00 - 3:20pm

Cyber Ark

Avertium

Break (10 min)

Open

Threat Hunting - Attacks on Election Systems

Tim Gurganus

Common Cloud Attack Scenarios and Solutions

Jon Clay

The Human Target: How Threat Actors Choose Their Mark - Proof Point

Sherrod Degrippo

Rapid7

3:20 - 3:40pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

3:40 - 4:00pm
4:00 - 4:10pm
4:10 - 4:30pm

CCPA & the New United States Privacy Laws

Joe Meyer

A-hunting We Will Go! Adverture in Endpoint Threat Detection

David Branscome

Cyberbiosecurity: Protecting Biomedical and Patient Data in the Cloud

Muskan Bansal, Vinay Bansal

Zero to SOC2 in One Year (or less)

Chuck Kessler

Proofpoint Nexus People-Risk Explorer - Identify, Assess and Mitigate People-Based Cybersecurity Risks -  Proof Point

Adam Steingrod

Rapid7: cont'd

4:30 - 4:40pm

Afternoon Break

Take this opportunity to visit our exhibitors and network with other attendees.

4:40 - 5:00pm
4:00 - 4:10pm
5:10 - 5:30pm

Psychology of the Phish: Leveraging the Seven Principles of Influence.

Soury Biswas

Secure SDLC Lessons Learned

Steve Hart

In the Beginning There Was Chaos - Telework Explosion 2020

Kim Green, Valdez Ladd, Mauricio Tavares

Leadership Track

David Stone

5:30 - 6:00pm

Giveaways and Door Prizes

Take this opportunity to network with other attendees.