Sched.com Conference Mobile Apps
2019 Triad of NC ISSA Security Summit
has ended
Create Your Own Event
2019 Triad of NC ISSA Security Summit
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Registration
Search
or browse by date + venue
Breakout Session
Conference Break
Keynote
All
Closing
Lunch
Morning
Training Session
All
90 Minute
Half Day
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Sponsors
Exhibitors
Registration
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Thursday
, June 20
8:30am EDT
Forescout and EITS - CounterACT
Lab 2441
InfraScale – It’s not about Backup! Keep Connected to Critical Applications via DRaaS!
Lab 2407
Check Point Software Solutions and The TENEO Group – Security Beyond the Perimeter Part 1
Rhoades B
Palo Alto Networks (PAN) and Data Network Solutions (DNS) – Palo Alto Networks Ultimate Test Drive – Security Operation Platform
Rhoades C
10:30am EDT
Forescout and EITS - CounterACT - Repeat Session
Lab 2441
InfraScale – It’s not about Backup! Keep Connected to Critical Applications via DRaaS! - Repeat Session
Lab 2407
12:00pm EDT
Lunch Break
Rhoades A
1:00pm EDT
InfraScale – It’s not about Backup! Keep Connected to Critical Applications via DRaaS!
Lab 2407
BlueTeamAssess - Mike Parsons - Open Source Intelligence (OSINT): Goals of OSINT, Framework, Tools, Searching for Data, Social Media, Monitoring and more
Lab 2441
Check Point Software Solutions and The TENEO Group – Security Beyond the Perimeter Part 2
Rhoades B
Palo Alto Networks (PAN) and Data Network Solutions (DNS) – Palo Alto Networks Ultimate Test Drive – Threat Prevention
Rhoades C
3:00pm EDT
InfraScale – It’s not about Backup! Keep Connected to Critical Applications via DRaaS! - Repeat Session
Lab 2407
Friday
, June 21
7:30am EDT
Conference Day Registration
Dewitt E. Rhoades Conference Center Lobby
8:15am EDT
Opening Remarks
Rhoades A
8:30am EDT
Breakfast Keynote - Arctic Wolf - SOC-as-a-Service & Tales from the Trenches: Cyber Security War Stories
Rhoades A
9:15am EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
9:30am EDT
Flashpoint - Evolution of Collections in Threat Intelligence
Lab 2441
Palo Alto Networks and Data Network Solutions (DNS) - The Security Operating Platform and the Future of AI and Machine Learning in CyberSecurity
Rhoades B
Rapid7 - Common Threats and Top Cyber Security Targets Based On Industry Research Reports
Rhoades C
The TENEO Group - Secure SD-WAN
Rhoades A
Varonis - The Modern State of Insecurity
Lab 2407
10:15am EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
10:30am EDT
BlueTeamAssess - Mike Parsons - A Practitioner’s Guide to the NIST Cybersecurity Framework - Why You Need to Consider NIST’s Framework a Private Sector Resource
Lab 2407
Crowdstrike - The 1/10/60 Minute Challenge: Defenders Win, Adversaries Lose Responding to Incidents within the “Breakout Time” Window
Rhoades C
Mitch Cyrus, CISSP - The SSAE 18 SOC 2 Type 2 Report
Rhoades B
Nia Luckey - Using self-awareness, leveraging EQ, and balancing technical skills and industry knowledge to become the employee every company is looking for and can't find.
Lab 2441
Proofpoint - Who are the Very Attacked People in your neighborhood? How a People-Centric Security approach results in the best training experience
Rhoades A
11:15am EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
12:00pm EDT
Make your way to the second-floor dining room to get your lunch and start seating for the keynote presentation.
Rhoades A
12:30pm EDT
Lunch Keynote - Check Point Software Technologies - Real Security – Beyond the Perimeter
Rhoades A
1:15pm EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
2:00pm EDT
Ed Harris, CISSP - A Risk-based Approach to Making Friends, Gaining Trust and Securing Funding
Lab 2407
Forescout and EITS - Converging IT-OT Networks: The Power of 100% Device Visibility & Control
Rhoades A
Gina Yacone, CCSFP, SSCP - Seat at the Table: Security Leadership Through Tabletop Exercises
Rhoades B
Tara Hunter, CISSP, CCSP - Cloud Security – Thinking beyond your security stack
Rhoades C
William Curtiss - Don't/Do Treat Your Cloud Like a Datacenter
Lab 2441
2:45pm EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
3:00pm EDT
Abdel M. Hason - Global Terrorism, and Use of Investigative Technology
Rhoades B
Cisco | Duo - DUO for Multifactor Authentication
Rhoades A
Microsoft - A Series of [un]Fortunate Events
Rhoades C
Panda Security - Misunderstanding EDR
Lab 2407
Steve Hunt - Supercharge Your Cybersecurity Career
Lab 2441
3:45pm EDT
Conference Break - Vendor Exhibits
1st Floor Conference Atrium
4:00pm EDT
Closing Keynote - EITS - Insider Threat: A White Hat Hacking Methodology Approach to Insider Threats
Rhoades A
4:45pm EDT
Closing Remarks - Drawings
Rhoades A
Timezone
2019 Triad of NC ISSA Security Summit
America/New York
Filter By Date
2019 Triad of NC ISSA Security Summit
Jun 20
-
21, 2019
Thursday
, June 20
Friday
, June 21
Filter By Venue
Forsyth Technical Community College - Robert L. Strickland Center
Sort schedule by Venue
1st Floor Conference Atrium
Dewitt E. Rhoades Conference Center Lobby
Lab 2407
Lab 2441
Rhoades A
Rhoades B
Rhoades C
Filter By Type
Breakout Session
Conference Break
Keynote
All
Closing
Lunch
Morning
Training Session
All
90 Minute
Half Day
Popular
Filter sessions
Apply filters to sessions.
close
Dates
Thursday
, June 20
Friday
, June 21
Venue
1st Floor Conference Atrium
Dewitt E. Rhoades Conference Center Lobby
Lab 2407
Lab 2441
Rhoades A
Rhoades B
Rhoades C
Session Type
Breakout Session
Conference Break
Keynote
All
Closing
Lunch
Morning
Training Session
All
90 Minute
Half Day
Other Filters
Popular