Skip to content

Instantly share code, notes, and snippets.

@dismal002
Created March 12, 2026 15:15
Show Gist options
  • Select an option

  • Save dismal002/0b7468c8472ddb1f78071d305ff6b5ed to your computer and use it in GitHub Desktop.

Select an option

Save dismal002/0b7468c8472ddb1f78071d305ff6b5ed to your computer and use it in GitHub Desktop.
Agenda
{
"result": "success",
"data": {
"event_basics": {
"event_name": "WiCyS 2026",
"timezone": "America/New_York",
"is_virtual_event": false
},
"show_deeplink": true,
"agenda": [
{
"date": "Mar 11, 2026",
"day": "Wed",
"time_ranges": [
[
"08:00",
[
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-11 08:00:00",
"sessions": [
{
"id": 5079217,
"name": "Badge PickUp",
"start_time": "08:00",
"end_time": "20:00",
"calendar_stime": "2026-03-11 08:00:00",
"calendar_etime": "2026-03-11 20:00:00",
"place": "Convention Center Pre-Function",
"docs": [],
"session_order": 0,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "08:00 PM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-11 08:00:00",
"sessions": [
{
"id": 5151163,
"name": "Information Desk Open",
"start_time": "08:00",
"end_time": "18:30",
"calendar_stime": "2026-03-11 08:00:00",
"calendar_etime": "2026-03-11 18:30:00",
"place": "Chesapeake 2",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:30 PM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-11 08:00:00",
"sessions": [
{
"id": 5151179,
"name": "Quiet/Reflection Room",
"start_time": "08:00",
"end_time": "21:30",
"calendar_stime": "2026-03-11 08:00:00",
"calendar_etime": "2026-03-11 21:30:00",
"place": "National Harbor 1",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:30 PM"
}
]
]
],
[
"09:30",
[
[
{
"start_time": "09:30 AM",
"calendar_stime": "2026-03-11 09:30:00",
"sessions": [
{
"id": 5079218,
"name": "INVITE ONLY: Leadership Breakfast & Symposium for Sponsors & Strategic Partners (must arrive by 9:35am to eat)",
"start_time": "09:30",
"end_time": "11:00",
"calendar_stime": "2026-03-11 09:30:00",
"calendar_etime": "2026-03-11 11:00:00",
"place": "Potomac C",
"desc": "\u003Cp\u003E\u003Cstrong id=\"docs-internal-guid-52362ffa-7fff-a639-b6c2-09bcb1c5a8a7\" style=\"font-weight: normal;\"\u003E\u003Cspan style=\"font-size: 12pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EJoin us for this special invite-only breakfast and symposium for leaders to learn about our latest research on the ROI of adopting cybersecurity talent management best practices. During this session, we'll explore findings from our new research report, produced in collaboration with FourOne Insights, that quantifies the bottom-line impact of skills-based, talent-friendly workforce strategies. We'll also discuss research-backed approaches to reducing hiring costs, increasing employee tenure through skills-based assessments, and boosting the resilience of our cybersecurity workforce. \u003C/span\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThe program begins at 9:45am ET.\u003C/span\u003E\u003C/strong\u003E\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "11:00 AM"
}
]
]
],
[
"10:00",
[
[
{
"start_time": "10:00 AM",
"calendar_stime": "2026-03-11 10:00:00",
"sessions": [
{
"id": 5079225,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "10:00",
"end_time": "11:00",
"calendar_stime": "2026-03-11 10:00:00",
"calendar_etime": "2026-03-11 11:00:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 8,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "11:00 AM"
}
]
]
],
[
"11:30",
[
[
{
"start_time": "11:30 AM",
"calendar_stime": "2026-03-11 11:30:00",
"sessions": [
{
"id": 5079219,
"name": "INVITE ONLY: Senior Career Luncheon Sponsored by Bloomberg, Google & Microsoft (must arrive by 11:35am to eat)",
"start_time": "11:30",
"end_time": "12:45",
"calendar_stime": "2026-03-11 11:30:00",
"calendar_etime": "2026-03-11 12:45:00",
"place": "Potomac D",
"desc": "\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EJoin us for a thought-provoking leadership luncheon designed for senior and executive professionals. Explore how the legacy of leadership within your organization is shaped not only by current success but by the caliber of leaders you cultivate for the future.\u003C/span\u003E\u003C/p\u003E\n\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThis luncheon provides an interactive space to engage with peers and industry leaders, emphasizing how true allyship moves beyond passive advising to active advocacy. Learn strategies for investing in mentorship and sponsorship today to ensure lasting impact and organizational relevance tomorrow.\u003C/span\u003E\u003C/p\u003E\n\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EBrought to you in collaboration with the WiCyS Executive Leaders Network, this luncheon includes a panel discussion featuring representatives from Bloomberg, Google, and Microsoft Corporation, offering insights, dialogue, and networking opportunities with fellow senior leaders. \u003C/span\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThe program begins at11:45am ET.\u003C/span\u003E\u003C/p\u003E\n\u003Cp\u003E \u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "12:45 PM"
}
],
[],
[
{
"start_time": "11:30 AM",
"calendar_stime": "2026-03-11 11:30:00",
"sessions": [
{
"id": 5079226,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "11:30",
"end_time": "12:30",
"calendar_stime": "2026-03-11 11:30:00",
"calendar_etime": "2026-03-11 12:30:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 9,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"12:00",
[
[
{
"start_time": "12:00 PM",
"calendar_stime": "2026-03-11 12:00:00",
"sessions": [
{
"id": 5079220,
"name": "First Timers Guide: Navigating Your First WiCyS Conference",
"start_time": "12:00",
"end_time": "13:00",
"calendar_stime": "2026-03-11 12:00:00",
"calendar_etime": "2026-03-11 13:00:00",
"place": "National Harbor 2-3",
"desc": "\u003Cp\u003EFirst time attending the WiCyS Conference and unsure of what to expect or how to navigate the experience?\u003Cbr\u003EJoin us for an engaging session designed specifically for newcomers. A diverse panel of participants—each bringing unique backgrounds and perspectives—will share their personal experiences, highlight the activities and moments they found most valuable, and offer practical guidance for making the most of your inaugural WiCyS Conference. Their insights will help you navigate your first WiCyS conference with confidence and fully maximize the value of this experience.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Elizabeth Hawthorne",
"pid": 51513061,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/e1ee32913a0566816f195ccb3168cda2d5022075cb0a3e982d61d544a0970304_1/Elizabeth_Hawthorne_Square.png",
"profile_id": 51513061,
"first_name": "Elizabeth",
"last_name": "Hawthorne",
"aff": "Northeastern University",
"title": "",
"industry": "",
"loc": "United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Mia Harkins",
"pid": 51513055,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10348650/2a379f4e28ee5b6783b7ce76d6a8573d.jpeg",
"profile_id": 51513055,
"first_name": "Mia",
"last_name": "Harkins",
"aff": "wicys",
"title": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Emily Miller",
"pid": 51514422,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/6708376/b316e7b36a89fe1cc7aafd88e3548239.jpeg",
"profile_id": 51514422,
"first_name": "Emily",
"last_name": "Miller",
"aff": "Lockheed Martin",
"title": "Cyber Software Engineer",
"loc": "Baltimore, Maryland",
"bio": "Emily Miller is a cybersecurity graduate student at the University of West Florida, where she is pursuing an M.S. in Cybersecurity with a concentration in System and Software Security. She earned dual B.S. degrees in Cybersecurity and Software Design and Development in May 2025, with minors in Computer Science and Honors. As a published author, Miller brings experience in cyber defense, automation, and software security engineering across government and industry sectors. \r\n\r\nMiller works as a Cyber Software Engineer at Lockheed Martin, where she modernizes secure systems, migrates backend architectures, enhances UI accessibility to meet Section 508 compliance, and drives modernization initiatives that improve performance, maintainability, and resilience. \r\n\r\nHer expertise includes penetration testing, vulnerability management, system hardening, and threat detection. She is skilled with tools such as Wireshark, Nmap, Nessus, Suricata, Security Onion, and Splunk, and automates secure environments using Ansible, Bash, and PowerShell. \r\n\r\nBefore joining Lockheed Martin, Miller completed three internships. At the Department of Defense, she worked as an Information Systems Security Engineer Intern, building a GPS-enabled PNT lab, simulating GNSS networks, and analyzing signal and timing data, and as a Software Engineer Intern, where she integrated the SkillTree platform into an internal onboarding website to enhance technical training. At Electronic Arts, she supported the NCAA Football relaunch by implementing secure telemetry and user data correlation tools using Splunk.\r\n\r\nAt UWF, she leads Cyber Range Automation Research, developing scalable Proxmox-based environments that orchestrate MITRE ATT&CK–mapped campaigns and generate synchronized datasets for AI-driven intrusion detection. Miller co-authored two research papers: “Fine-Tuned Variational Quantum Classifiers for Cyber Attack Detection,” presented at IEEE COMPSAC 2024, and “Classifying Cyber Ranges: A Case-Based Analysis Using the UWF Cyber Range,” published in MDPI Encyclopedia (2025).\r\n\r\nHer background reflects a deep commitment to national security, advanced technical education, and real-world cyber defense.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 2
},
{
"name": "Barbara Hewitt",
"pid": 51513837,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/3530947/f6b8e3c6b1e46e113d9d5adc62f6935c.jpeg",
"profile_id": 51513837,
"first_name": "Barbara",
"last_name": "Hewitt",
"aff": "Texas State University",
"title": "",
"loc": "Austin, Texas",
"bio": "Barbara Hewitt received her Ph.D. in Information Technology (IT) and her BS in Computer Science from the University of Texas at San Antonio. She earned a Master of Business Administration from Texas State University. After teaching in the Computer Information Systems Program at Texas A&M University -- San Antonio, she rejoined the Department of Health Information Management at Texas State University and teaches Health Information Security, Project Management, Health Information Technology courses. Her research focuses on computer security and health interventions is published in Database, Information Systems Frontier, Journal of Computer Information Systems, Journal of Organizational and End User Computing, AIS Transactions on Human-Computer Interaction, Communication of the American Information Systems, Perspectives in HIM, Healthcare, and Behavioral and Information Technology. She brings over 15 years of software development experience with her to the classroom. Dr. Hewitt supports students in competitions including in healthcare and several security competitions. She founded the San Antonio Women in Technology to support women considering a computing career.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 3
},
{
"name": "Doug Britton",
"pid": 51560314,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/2e3a03f4aff59caec0abd4f3107dd0d62a9eb56b26e9e2cd76d5ca23ab3e92f1_1/Doug_CROPPED_1_.jpeg",
"profile_id": 51560314,
"first_name": "Doug",
"last_name": "Britton",
"aff": "Haystack Solutions",
"title": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 4
},
{
"name": "Nikkia Henderson",
"pid": 51597861,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/0d96b9ce6f104158ccd813881f0a5daad341cdad091c2d169e4d6107c11314d1_1/Nikkia_Henderson.jpeg",
"profile_id": 51597861,
"first_name": "Nikkia",
"last_name": "Henderson",
"title": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 5
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "01:00 PM"
}
],
[],
[
{
"start_time": "12:00 PM",
"calendar_stime": "2026-03-11 12:00:00",
"sessions": [
{
"id": 5079221,
"name": "Recruiter's Session: The STAR Power: How Redefining Hiring Can Close the 4.8 Million Cybersecurity Talent Gap",
"start_time": "12:00",
"end_time": "13:00",
"calendar_stime": "2026-03-11 12:00:00",
"calendar_etime": "2026-03-11 13:00:00",
"place": "Chesapeake ABC",
"desc": "\u003Cp\u003EThe global cybersecurity talent gap currently sits at 4.8 million people, yet a vast, underutilized pool of talent exists: STARs—Skilled Through Alternative Routes. These are individuals who possess practical skills developed via bootcamps, community college, certifications, and on-the-job experience, rather than a traditional four-year degree. While STARs represent over 51% of the total US workforce, they currently account for only 41% of the cyber sector, indicating a significant and self-imposed hiring barrier.\u003Cbr\u003EThis panel will move beyond simply identifying the shortage to offering immediate, actionable strategies for organizations. We will discuss data-driven findings on STAR representation, common \"feeder roles\" (like Computer Support Specialist), and the essential skills required for upward mobility in security. Attendees will leave with concrete knowledge on how to rethink degree requirements, implement successful internal mobility programs, and leverage non-profit partnerships to build a resilient, skills-first cybersecurity workforce.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Keenan Harrell",
"pid": 51320065,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/a9139ae2b8806689901111d76c18ac6ec9e65b7909d0c5c6be375a8f9bfcea8d_1/Harrell.jpeg",
"profile_id": 51320065,
"first_name": "Keenan",
"last_name": "Harrell",
"aff": "Okta",
"title": "Program Lead, Philanthropy",
"industry": "",
"loc": "Washington DC-Baltimore Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Vrushali Channapattan",
"pid": 51320067,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/1bd64571c0a8bc9c3e91aa4ededc57f6006dfe32142594af6b9befe41ea015c0_1/Channapattan.jpeg",
"profile_id": 51320067,
"first_name": "Vrushali",
"last_name": "Channapattan",
"aff": "Okta",
"title": "Director of Engineering",
"industry": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Chris Hartzell",
"pid": 51320071,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/86c546ed1b1116db20b908e3871d218cd649a96de0f04d224039407ea92cb1a4_1/Hartzell.png",
"profile_id": 51320071,
"first_name": "Chris",
"last_name": "Hartzell",
"aff": "Okta",
"title": "Recruiting Manager",
"industry": "",
"loc": "Boston, Massachusetts, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 2
},
{
"name": "Beth Wiles",
"pid": 51320072,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10359480/f1605e2b6112b9bf8d547b478857a594.jpeg",
"profile_id": 51320072,
"first_name": "Beth",
"last_name": "Wiles",
"aff": "Opportunity at Work",
"title": "Senior Director, Advisory",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "01:00 PM"
}
],
[],
[
{
"start_time": "12:00 PM",
"calendar_stime": "2026-03-11 12:00:00",
"sessions": [
{
"id": 5079224,
"name": "Career Growth Hub and Headshots Open",
"start_time": "12:00",
"end_time": "18:15",
"calendar_stime": "2026-03-11 12:00:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "National Harbor 6-8",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "12:00 PM",
"calendar_stime": "2026-03-11 12:00:00",
"sessions": [
{
"id": 5079222,
"name": "CTF (Capture The Flag) Coaching Available",
"start_time": "12:00",
"end_time": "18:15",
"calendar_stime": "2026-03-11 12:00:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "National Harbor 10-11",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "12:00 PM",
"calendar_stime": "2026-03-11 12:00:00",
"sessions": [
{
"id": 5079223,
"name": "WiCyS Store Open",
"start_time": "12:00",
"end_time": "18:15",
"calendar_stime": "2026-03-11 12:00:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "National Harbor 4-5",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
]
]
],
[
"13:15",
[
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5079227,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "13:15",
"end_time": "14:15",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 14:15:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "02:15 PM"
}
],
[],
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5079230,
"name": "Workshop: Code Red in the SOC: Responding to a Hospital Ransomware Attack",
"start_time": "13:15",
"end_time": "15:00",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 15:00:00",
"place": "Maryland A",
"desc": "\u003Cp\u003EWhen a hospital’s systems go dark, it’s not just data at stake, it’s lives...\u003Cbr\u003EIn this immersive and interactive workshop, participants will step into the Security Operations Center (SOC) of St. Theresa Medical Center, a fictional healthcare organization facing a full-scale ransomware attack that threatens patient safety and public trust.\u003C/p\u003E\n\u003Cp\u003EGuided by facilitators, attendees will role-play key positions from the SOC analysts and IT helpdesk engineers to legal advisors, communications officers and executives. As the incident unfolds through a series of real-time injects, teams must investigate, respond and communicate under pressure, deciding when to escalate, how to handle the media, and how to balance ethics, operations and recovery.\u003C/p\u003E\n\u003Cp\u003EThis session replicates the intensity of real-world incident response and demonstrates how leadership, communication and technical actions intersect during a crisis. Participants will experience how structured tabletop exercises help organizations uncover weaknesses, strengthen collaboration and build resilience long before a real attack occurs.\u003C/p\u003E\n\u003Cp\u003EBy the end of this workshop, attendees will walk away with a deeper understanding of crisis coordination and decision-making under pressure. There are no winners or losers here, only lessons learned, teamwork built and awareness raised.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Paula De Albuquerque",
"pid": 50917529,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/68b72fa703b03a5d684aa69f3ffad827.jpeg",
"profile_id": 50917529,
"first_name": "Paula",
"last_name": "De Albuquerque",
"aff": "Fortinet",
"title": "SOC Technical Trainer",
"industry": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Shaabena Abdul Ghani",
"pid": 50917543,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/6150024b5bc6c23e683c0440f431c1a8739bbcee67a08cdd7daa02b0d6054743_1/Abdul_Ghani.jpeg",
"profile_id": 50917543,
"first_name": "Shaabena",
"last_name": "Abdul Ghani",
"aff": "Fortinet",
"title": "Principal Technical Trainer",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 1
},
{
"name": "Mandeep Malhi",
"pid": 50917509,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9014200/493fb9bb076d3f6f841e5aec1d894bb8.jpeg",
"profile_id": 50917509,
"first_name": "Mandeep",
"last_name": "Malhi",
"aff": "Fortinet",
"title": "Curriculum Developer",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 2
},
{
"name": "Victoria Isambert",
"pid": 51320080,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10340732/6671f096106535a2c81f2b579fadc680.jpeg",
"profile_id": 51320080,
"first_name": "Victoria",
"last_name": "Isambert",
"aff": "Fortinet",
"title": "Service Relationship Manager",
"industry": "",
"loc": "France",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5138734,
"name": "Workshop: From Code to Exploit: Hands-On AI for Smart Contract Security with Large Language Models",
"start_time": "13:15",
"end_time": "15:00",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 15:00:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EAs blockchain and decentralized applications become integral to finance and infrastructure, their underlying smart contracts remain a critical attack surface that is vulnerable to attacks like reentrancy, integer overflow and timestamp dependency. This interactive workshop immerses participants in hands-on vulnerability detection using machine learning (ML) and large language models (LLM).\u003C/p\u003E\n\u003Cp\u003EThis session begins with a brief, accessible primer on blockchain and Ethereum smart contracts followed by a guided lab where attendees train and test lightweight ML and LLM models (e.g., DistilBERT, BERT, RoBERTa, etc.) to detect real-world vulnerabilities. Participants will explore how those models are trained on real datasets and how they are able to detect vulnerabilities. \u003C/p\u003E\n\u003Cp\u003ENo prior blockchain experience is required, only curiosity and basic Python familiarity. All exercises use open-source datasets and Google Colab, ensuring an inclusive, laptop-friendly environment. By the end, attendees will understand how AI can strengthen cybersecurity pipelines, experience model-based vulnerability detection firsthand and gain reproducible notebooks for continued exploration.\u003C/p\u003E\n\u003Cp\u003EThis session bridges AI and cybersecurity through an applied, research-driven approach and empowers the WiCyS community to innovate at the intersection of trust, transparency and intelligent automation in emerging decentralized systems.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Amani Altarawneh",
"pid": 51320084,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/ffaa7fef426fafee30bb76e1b32641ea.jpeg",
"profile_id": 51320084,
"first_name": "Amani",
"last_name": "Altarawneh",
"aff": "Tennessee Tech University",
"title": "",
"industry": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "S M Mostaq Hossain",
"pid": 51320086,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/7431191/ecf3e7dc0a1689cc6271ab0963bffd2e.jpeg",
"profile_id": 51320086,
"first_name": "S M Mostaq",
"last_name": "Hossain",
"aff": "Tennessee Technological University",
"title": "Graduate Research Assistant, PhD Student",
"industry": "",
"loc": "Cookeville, Tennessee",
"frame_pic": "https://d1keuthy5s86c8.cloudfront.net/static/event/slide/wicys_202403/full_photo_frame_7431191_163890_1712005708.855912.jpeg",
"bio": "# Working on Blockchain Smart Contracts and Large Language Models\n# Experienced in Python and it’s libraries for machine learning\n# Experienced in .NET API framework and MongoDB for NoSQL database \n# Experienced Android application developer \n# Experienced Java and Php based Web application developer both Front-end and Back-end\n# Experienced Windows application developer in UWP & C++\n# Intermediate Database designer\n# Full Stack Developer with 6 years of experience\n# Interest to learn new technology",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Jemima Owusu Tweneboah",
"pid": 51320088,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202506/5b5904872df6063af8135baac661cb6e11d262a60031de3826214c4e18ce0bbf_1/Jemima.jpeg",
"profile_id": 51320088,
"first_name": "Jemima",
"last_name": "Owusu Tweneboah",
"aff": "Tennessee Technological University",
"title": "Graduate Research Assistant",
"industry": "",
"loc": "Ghana",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 2
},
{
"name": "Anca Pop",
"pid": 51330973,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10303270/525c4454239aef0ef7dc87e23c3eb804.jpeg",
"profile_id": 51330973,
"first_name": "Anca",
"last_name": "Pop",
"aff": "Tennessee Technological University",
"title": "Graduate Student",
"industry": "",
"loc": "Nashville, Tennessee",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5079232,
"name": "Workshop: Agentic AI for Cybersecurity Professionals",
"start_time": "13:15",
"end_time": "15:00",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 15:00:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EIn today’s cybersecurity landscape, professionals spend a significant portion of their time on repetitive, manual tasks such as evidence collection, control testing, framework harmonization, policy updates and risk management. These activities, while essential, often limit the capacity for strategic thinking and innovation.  \u003C/p\u003E\n\u003Cp\u003EEnter agentic AI: autonomous, goal-driven agents that don’t just assist, they act. These systems are reshaping the cybersecurity workforce by automating complex workflows, adapting to evolving threats and collaborating with human experts in real time. Early adopters report operational efficiency gains of up to 1,000+ hours, unlocking new levels of resilience and agility. \u003C/p\u003E\n\u003Cp\u003EHowever, the industry stands at a critical inflection point. Cyber professionals who learn to effectively deploy and collaborate with AI agents will gain a competitive edge while those who fail to adapt risk falling behind. To help cybersecurity professionals navigate this shift and harness the full potential of agentic AI, this session will explore practical, real-world applications of AI agents in cybersecurity; guide attendees on how to identify high-impact use cases; facilitate designing an agentic AI orchestration workflow from scratch; and offer a framework to measure success and ROI post-deployment. \u003C/p\u003E\n\u003Cp\u003EWhether a technical practitioner or a cybersecurity leader, this session will equip participants with the tools and mindset needed to thrive in an AI-augmented future.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Lindsey Nicholas",
"pid": 51320094,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9009866/7fac07924d98a8c3be6dfcb0b9f445c1.jpeg",
"profile_id": 51320094,
"first_name": "Lindsey",
"last_name": "Nicholas",
"aff": "risk3sixty",
"title": "AI Product Specialist",
"loc": "Atlanta, Georgia",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Audrey Johnson",
"pid": 51320096,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8968572/8070321ca900391fca7d8ebb629ed061.jpeg",
"profile_id": 51320096,
"first_name": "Audrey",
"last_name": "Johnson",
"aff": "risk3sixty",
"title": "Customer Support Specialist",
"industry": "",
"loc": "Atlanta Metropolitan Area",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Grace Pfohl",
"pid": 51320097,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9010425/a3f19fc67a6223150d518bf24c1b656f.jpeg",
"profile_id": 51320097,
"first_name": "Grace",
"last_name": "Pfohl",
"aff": "risk3sixty",
"title": "Senior Consultant, AI Advisory Team Lead",
"industry": "",
"loc": "Atlanta, GA",
"bio": "Governance, Risk, and Compliance Consulting @ risk3sixty",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5079233,
"name": "Workshop: NeuroCode 2.0: The Mind as the New Attack Surface",
"start_time": "13:15",
"end_time": "15:00",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 15:00:00",
"place": "Maryland D",
"desc": "\u003Cp\u003ENeuroCode 2.0 dives into the frontier where neuroscience and cybersecurity collide — when the human brain becomes both credential and target. As brain-computer interfaces and neuro-wearables capture thought patterns and emotional data, new vulnerabilities emerge: neural spoofing, cognitive leakage and “dream-phishing.”\u003C/p\u003E\n\u003Cp\u003EThis workshop blends emerging research with interactive ethical simulations. Participants will explore how brainwave-based authentication could be exploited, debate neural-data ownership and design safeguards to protect cognitive privacy. Through short scenario labs and guided discussion, attendees will learn how to map traditional security frameworks onto this uncharted, human-centered terrain.\u003C/p\u003E\n\u003Cp\u003EBy the end, participants will grasp why protecting the mind’s data layer may define the next decade of cybersecurity and how interdisciplinary collaboration between technologists, ethicists and neuroscientists will be vital to secure it.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Mariami Kentchadze",
"pid": 50917511,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8958177/920c1fa105c48f769d0d54796002b5e0.jpeg",
"profile_id": 50917511,
"first_name": "Mariami",
"last_name": "Kentchadze",
"aff": "Utica College",
"title": "",
"industry": "",
"loc": "New York City, New York",
"bio": "Mariami Kentchadze is a cybersecurity professional, researcher, and educator specializing in Cyber Operations, Computer Science, and Criminal Justice. With extensive experience in offensive and defensive security, she has led projects in penetration testing, threat intelligence, and incident response, honing her skills through high-stakes competitions and hands-on research.\nHer current work explores the emerging frontier of neurocrime and cognitive hacking, examining the intersection of neuroscience and cybersecurity to uncover vulnerabilities in brain-computer interfaces and cognitive security. Through this research, she challenges conventional cybersecurity paradigms, addressing the evolving threats posed by advancements in neurotechnology.\nMariami is also deeply committed to education and mentorship, shaping the next generation of cybersecurity professionals. She has played a pivotal role in fostering diversity, equity, and inclusion in cybersecurity, creating opportunities for women, underrepresented communities, and cultural initiatives internationally within and outside of the industry.\nMariami is passionate about exploring emerging threats and fostering innovation in cybersecurity.\nThrough research, education, and mentorship, she strives to contribute to a more secure and inclusive digital future.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "01:15 PM",
"calendar_stime": "2026-03-11 13:15:00",
"sessions": [
{
"id": 5163799,
"name": "SeeHerAsTechnical",
"start_time": "13:15",
"end_time": "15:45",
"calendar_stime": "2026-03-11 13:15:00",
"calendar_etime": "2026-03-11 15:45:00",
"place": "Chesapeake E-F",
"desc": "\u003Cp\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif;\"\u003EThis session is new for WiCyS 2026. It is a high-impact, interactive session designed to bridge the gap between theoretical knowledge and industry reality by replacing the traditional lecture format with direct, unscripted access to seasoned industry professionals. This session is set up as a collaborative hub for everyone from students and career switchers looking to learn how to break into the field to junior analysts. Attendees can expect a rotating environment where they can dive into technical methodologies, discuss current threat landscapes and receive career pathway advice from experts in the field. Whether seeking to break into the field or dive deeper into a technical niche, this is an opportunity to engage with senior technical professionals and gain the technical intelligence to navigate the current cybersecurity landscape. \u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003ESpecific topics Include t\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Ehreat Intelligence; p\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eroduct and engineering; o\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eperations and threat intelligence; d\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eata science, AI and machine learning engineering. \u003C/span\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003EThis will be an open format, standing room only, walk around environment.\u003C/span\u003E\u003C/strong\u003E\u003C/p\u003E\n\u003Cp\u003E \u003C/p\u003E",
"docs": [
{
"title": "SeeHerAsTechnical",
"url": "https://dk2avac86djtt.cloudfront.net/gd_scan/771dd962-8037-4d1d-bf3c-1460883af763/see_her_as_technical.pdf",
"file_id": "771dd962-8037-4d1d-bf3c-1460883af763",
"description": "",
"size": 4571068,
"from_speaker": "",
"time": "March 11, 2026 at 06:10am",
"type": "pdf",
"user": 1590142
}
],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
"Speaker": [
{
"name": "Jackie McGuire",
"pid": 51513267,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/f8c2f3f3d389a06bd91f2c56112e0b54.jpeg",
"profile_id": 51513267,
"first_name": "Jackie",
"last_name": "McGuire",
"aff": "jackiesinsecurity",
"title": "Jackie",
"industry": "",
"loc": "Tucson, Arizona, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Speaker",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "03:45 PM"
}
]
]
],
[
"14:45",
[
[
{
"start_time": "02:45 PM",
"calendar_stime": "2026-03-11 14:45:00",
"sessions": [
{
"id": 5079228,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "14:45",
"end_time": "15:45",
"calendar_stime": "2026-03-11 14:45:00",
"calendar_etime": "2026-03-11 15:45:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; font-size: 12pt; text-size-adjust: 100%; vertical-align: baseline; background: transparent;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EVisit the conference agenda \u003C/strong\u003E\u003Ca style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; color: rgb(128, 40, 146); text-decoration: none;\" href=\"https://www.wicys.org/events/2026-agenda/\" target=\"_blank\" rel=\"noopener\" data-cke-saved-href=\"https://www.wicys.org/events/2025-conference-agenda/\"\u003E\u003Cu style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EHERE\u003C/strong\u003E\u003C/u\u003E\u003C/a\u003E \u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003Efor full details and escape room days/times.\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 11,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "03:45 PM"
}
]
]
],
[
"15:30",
[
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-11 15:30:00",
"sessions": [
{
"id": 5079234,
"name": "Presentation: Building Business Relationships: The Business Information Security Officer Role as the Bridge Between Security and the Business",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-11 15:30:00",
"calendar_etime": "2026-03-11 16:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003EIn today's rapidly evolving business landscape, the need for robust security programs that align seamlessly with business objectives is more critical than ever. Join an insightful session focused on the pivotal business information security officer (BISO) role, a strategic bridge between security needs and business units objectives. Designed for mid- to senior career professionals, this session explores how BISOs can effectively integrate security priorities with business goals to foster collaboration, drive innovation and achieve organizational success.\u003Cbr\u003ELearn how BISOs leverage their unique position to translate complex security requirements into actionable business strategies. The presenters will delve into the core competencies required for BISOs such as communication, leadership and strategic thinking that empower them to facilitate productive dialogue between security and business teams.\u003Cbr\u003EDiscover best practices for building and maintaining strong interdepartmental relationships, ensuring that security initiatives enhance, instead of hinder, business processes. Through real-world examples and interactive discussion, this session will showcase how BISOs navigate the intricacies of regulatory compliance, risk management and cybersecurity awareness within the business context.\u003Cbr\u003EThis session offers valuable insights for professionals looking to enhance their leadership capabilities and drive impactful change within their organizations. This session is for anyone considering the path to becoming a BISO or simply wishing to deepen their skills and understanding of the integral role security plays in business strategy and priorities.\u003C/p\u003E",
"docs": [],
"session_order": 17,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Zabrina McIntyre, CISSP, PMP",
"pid": 50917563,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5700638/e1eb328fe49fa6edb1eea4f6432b0783.jpeg",
"profile_id": 50917563,
"first_name": "Zabrina",
"last_name": "McIntyre, CISSP, PMP",
"aff": "KPMG",
"title": "Cybersecurity and Tech Risk",
"loc": "Greater Seattle",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Barbee Mooneyhan",
"pid": 51320109,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/3580838/f3750d18fc2e009f7f2e9234abe7889c.jpeg",
"profile_id": 51320109,
"first_name": "Barbee",
"last_name": "Mooneyhan",
"aff": "Uplight ",
"title": "CISO",
"industry": "",
"loc": "Nashville, Tennessee",
"bio": "Progressive and strategic leader with 20 years of experience providing IT Security, Operational, and Service solutions in highly regulated verticals. Recognized for developing and maintaining tactical, comprehensive enterprise information security and risk management programs, maturing the security posture of an organization. Driven to work with the business to meet operational needs and help protect not only businesses but the information and people under their purview. Real-world breach experience, reducing risk profile and collaborating laterally and vertically, including C-Suite Executives.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-11 15:30:00",
"sessions": [
{
"id": 5079235,
"name": "Presentation: Privacy-Preserving Database Recovery: Protecting Sensitive Data During System Failures",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-11 15:30:00",
"calendar_etime": "2026-03-11 16:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EWhen database systems crash, recovery mechanisms must restore data quickly and correctly, but what happens to privacy during this critical process? Traditional database recovery exposes sensitive information in ways that most security professionals overlook, creating vulnerabilities that affect healthcare systems, financial institutions and cloud services worldwide.\u003Cbr\u003EThis session explores the fundamental conflict between database durability and data privacy, introducing attendees to an emerging area of cybersecurity research. Participants will learn why standard encryption approaches fail to protect data during recovery operations and discover how recent vulnerabilities in production systems demonstrate these risks. Through real-world examples from published research, including MongoDB's queryable encryption issues, attendees will understand how seemingly secure databases can leak sensitive patterns during routine operations.\u003Cbr\u003EThe presentation will introduce high-level concepts for addressing these vulnerabilities, including applications of cryptographic protocols in database systems. Attendees will gain insights into the complex trade-offs between system performance, recovery guarantees and privacy protection. The session also will discuss the practical implications for organizations handling sensitive data and explore future directions for secure database architecture.\u003Cbr\u003EKey takeaways include recognizing overlooked privacy vulnerabilities in database systems, understanding why traditional security measures are insufficient during recovery and learning about emerging approaches to protect sensitive data throughout the entire database lifecycle. This research area has critical implications for regulatory compliance, data breach prevention and building trustworthy infrastructure for the next generation of privacy-conscious applications.\u003C/p\u003E",
"docs": [],
"session_order": 18,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Maria Fanelle",
"pid": 50917510,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8964672/d851da20074257cf4852efeea7e05a86.jpeg",
"profile_id": 50917510,
"first_name": "Maria",
"last_name": "Fanelle",
"aff": "MITRE",
"title": "Cloud Engineer",
"industry": "",
"loc": "Boston, Massachusetts",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-11 15:30:00",
"sessions": [
{
"id": 5079236,
"name": "Presentation: Shield Protocol: Decision Making and Teamwork in Cyber Defense",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-11 15:30:00",
"calendar_etime": "2026-03-11 16:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EExperience an interactive cyber defense exercise designed to build confidence and reveal how everyday skills – leadership, communication and problem-solving – are foundational to cybersecurity careers. As threats escalate, participants will step into decision-making roles and experience how diverse backgrounds, including military experience, strengthen cyber teams.\u003C/p\u003E",
"docs": [],
"session_order": 19,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Elizabeth Tatulis",
"pid": 51320130,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/8cfa013ed6c4409535a1e2f8e91747c9b211e6852cf66c0b56329f1d4bc8b47a_1/Tatulis.jpeg",
"profile_id": 51320130,
"first_name": "Elizabeth",
"last_name": "Tatulis",
"aff": "Accenture",
"title": "US Cyber Readiness Lead",
"loc": "New Hampshire",
"bio": "Elizabeth Tatulis is Security Consulting Senior Manager for Life Sciences and the Cyber Innovation Hub Engagement Lead at Accenture. She has more than 13 years of IT experience and cybersecurity experience. Ms. Tatulis helps clients strategize and implement various security programs from risk management to insider threat and mergers and acquisitions, understanding the regulatory landscapes and best practices from industry peers. As the CIH Lead, she drives and delivers Cyber Crisis Executive Experiences and various workshops for clients to help understand the Security landscape, create roadmaps, and help executives understand cybersecurity through a business lens. A veteran of the U.S. Navy and co-president of the Women in Cybersecurity Military Affiliate, Ms. Tatulis works to promote diversity and inclusion in the cybersecurity field for women veterans and military spouses.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Stephanie Depetro",
"pid": 51320133,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/d21f6f5fd14c7e39d1ac8a3c68551bf3468ca08c786d372a182d99db6edbf4ab_1/Depetro.jpeg",
"profile_id": 51320133,
"first_name": "Stephanie",
"last_name": "Depetro",
"aff": "Optum",
"title": "Security Engineer",
"industry": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-11 15:30:00",
"sessions": [
{
"id": 5079237,
"name": "Presentation: Empowering the Pipeline: Introducing the Women in CyberSecurity Training and Education Affiliate",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-11 15:30:00",
"calendar_etime": "2026-03-11 16:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EThis session introduces the Women in CyberSecurity (WiCyS) Training and Education Affiliate and highlights its mission to recruit, retain and advance women in the cybersecurity field through education, mentorship and professional development. Attendees will learn how the affiliate serves as a collaborative hub connecting academia, industry and government to create meaningful pathways into cybersecurity careers.\u003Cbr\u003EThe presenters will share the structure and goals of the affiliate, current initiatives and opportunities for involvement for faculty, administrators, students and industry partners. Participants will gain insight into how the affiliate supports workforce development through hands-on training, certifications, workshops, networking events and community outreach.\u003Cbr\u003EThis presentation also explores how institutions can partner with WiCyS to strengthen their cybersecurity programs, increase female participation and promote diversity and inclusion across technical disciplines. Attendees will walk away with practical strategies to engage students, build supportive learning environments and leverage affiliate resources within their own programs.\u003Cbr\u003EWhether the participant is an educator, administrator or industry professional, this session will demonstrate how the WiCyS Training and Education Affiliate can serve as a catalyst for expanding opportunities, closing the skills gap and shaping the next generation of cybersecurity leaders.\u003C/p\u003E",
"docs": [],
"session_order": 20,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Litany Lineberry",
"pid": 50917504,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/91bc11bd9aac831c06c6270dca698ff1.jpeg",
"profile_id": 50917504,
"first_name": "Litany",
"last_name": "Lineberry",
"aff": "Hinds Community College",
"title": "Instructor of Information Systems Technology",
"industry": "",
"loc": "Starkville, Mississippi, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Tricia McMahon - MSCYB, MSENM",
"pid": 51320142,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5678218/1ebd6be677d7b628e2fe025a4b94187c.jpeg",
"profile_id": 51320142,
"first_name": "Tricia McMahon",
"last_name": "- Mscyb, MSENM",
"loc": "San Diego",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-11 15:30:00",
"sessions": [
{
"id": 5139150,
"name": "Career Fair Setup by Sponsors",
"start_time": "15:30",
"end_time": "17:30",
"calendar_stime": "2026-03-11 15:30:00",
"calendar_etime": "2026-03-11 17:30:00",
"place": "Prince George's Hall E",
"docs": [],
"session_order": 21,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "05:30 PM"
}
]
]
],
[
"16:30",
[
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5079229,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "16:30",
"end_time": "17:30",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 17:30:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "05:30 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5079238,
"name": "Workshop: AI Cyber GRC: Striking the Tricky Balance Between Managing Risks of AI vs. Risks to AI",
"start_time": "16:30",
"end_time": "18:15",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003EEffective AI cybersecurity and governance require clear, well-documented controls that address key risks like bias, data privacy, misinformation and misuse while also ensuring compliance with cybersecurity standards to protect AI systems. \u003C/p\u003E\n\u003Cp\u003EThis workshop is designed to empower cybersecurity professionals with practical insights into the unique risks AI poses to users and organizations as well as the threats from adversaries seeking to exploit AI systems. Participants will learn how to develop and implement robust controls for building and securing AI responsibly.\u003C/p\u003E\n\u003Cp\u003ETo bring these concepts to life, participants will dive into hands-on exercises, including risk assessments and threat modeling across three different AI use cases. The ultimate goal? To transform cybersecurity pros into AI risk-aware defenders equipped with the knowledge, frameworks and tools to make AI systems secure, resilient and trustworthy.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Shafia Zubair",
"pid": 51320145,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/0e18a6037c948c0c33ee9434297c1e0d.jpeg",
"profile_id": 51320145,
"first_name": "Shafia",
"last_name": "Zubair",
"aff": "Johnson Controls ",
"title": "Director, GRC",
"industry": "",
"loc": "Greater Chicago",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5213249,
"name": "ADDED: Workshop: AWS Security Agent: Get started with AI-powered proactive AppSec",
"start_time": "16:30",
"end_time": "18:15",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EApplication security has traditionally been reactive — vulnerabilities discovered late in the development cycle, periodic penetration tests that create bottlenecks, and security requirements inconsistently enforced across teams. What if AI could change that?\u003C/span\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EIn this hands-on workshop, participants will explore AWS Security Agent, a frontier AI agent (announced in reInvent 2025)  that proactively secures applications throughout the entire development lifecycle. Attendees will get practical experience with three core capabilities: automated penetration testing on demand, AI-powered design document reviews, and intelligent code review against organizational security requirements.\u003C/span\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EParticipants will walk through setting up AWS Security Agent, defining custom security requirements (approved authorization libraries, logging standards, data access policies), running a live penetration test against a provided endpoint, reviewing architectural documents for security gaps, and evaluating a GitHub pull request for security violations — all enforced consistently by AI.\u003C/span\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cbr style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"color: rgb(29, 28, 29); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EThis session is designed for security engineers, software developers, and DevSecOps practitioners who want to understand how AI agents are transforming AppSec from a periodic checkpoint into a continuous, proactive practice.\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Manonmayi Vedam",
"pid": 51513597,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10337808/53498bed4ae26e2ddcb1fc74bef23c64.jpeg",
"profile_id": 51513597,
"first_name": "Manonmayi",
"last_name": "Vedam",
"aff": "Amazon Web Services",
"title": "",
"industry": "",
"loc": "Redmond, Washington, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Anjana Krishnan",
"pid": 50917454,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8998532/f458c023f659cde5a643e34e631426fc.jpeg",
"profile_id": 50917454,
"first_name": "Anjana",
"last_name": "Krishnan",
"aff": "Amazon Web Services",
"title": "Technical Account Manager",
"industry": "",
"loc": "Denver Metropolitan Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Ramya Mikkilineni",
"pid": 50917534,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9010440/83d4bd8b9ff97fac292ffc5033ea77bd.jpeg",
"profile_id": 50917534,
"first_name": "Ramya",
"last_name": "Mikkilineni",
"aff": "Amazon Web Services",
"title": "",
"industry": "",
"loc": "Denver, Colorado",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 2
},
{
"name": "Sushma Sunkollu Nagaraj",
"pid": 51443559,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/3fd2ec1bebf3fbfb46288d7caf1b02f2289234dff85dda38dad3fd6e660402ea_1/Sunkollu_Nagaraj.jpeg",
"profile_id": 51443559,
"first_name": "Sushma",
"last_name": "Sunkollu Nagaraj",
"aff": "Amazon Web Services",
"title": "Partner Solutions Architect",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5079239,
"name": "CANCELLED: Workshop: Automating Purple Team: Hands-On Adversary Simulation and Detection",
"start_time": "16:30",
"end_time": "18:15",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EThis workshop introduces participants to a practical framework for automating purple team operations. By combining adversary emulation, detection engineering and orchestration, attendees will learn how to continuously validate defenses against evolving threats. Using open-source tools such as Caldera, Sigma and SOAR platforms, participants will simulate real-world attack scenarios mapped to MITRE ATT&CK, analyze detection coverage and automate response workflows. The session emphasizes repeatability and scalability, enabling organizations to move beyond one-off exercises toward continuous security validation. By the end, attendees will have hands-on experience in building a purple team automation lab and leave with actionable methods to integrate automation into their own environments.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Taneesha Shah",
"pid": 51320150,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/93a39efb4344ec8dcd4cbdce50a4cd70fca65d73d3c7f451491c398f0527d4aa_1/Shah.jpeg",
"profile_id": 51320150,
"first_name": "Taneesha",
"last_name": "Shah",
"aff": "National Forensic Sciences University, Gandhinagar",
"title": "",
"loc": "Gandhinagar, Gujarat, India",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5079240,
"name": "Workshop: Modern Memory Forensics with Volatility 3",
"start_time": "16:30",
"end_time": "18:15",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EModern malware deploys memory-only payloads to evade EDR detection, avoid writing to the local file system and remain stealthy. In this workshop, participants will learn how to detect such malware, which is widely deployed in targeted and ransomware attacks, with the Volatility 3 memory analysis framework. Volatility 3 is the latest version of the Volatility Memory Analysis framework and is a complete redesign and rewrite of the framework suited to meet the needs of modern investigations. Attendees will learn Volatility 3’s new features aimed at efficiency and usability as well as all the new and updated Windows plugins capable of detecting modern malware. Participants will experience a mix of lecture and live demonstration about the latest malware techniques followed by hands-on labs that will require them to analyze infected memory samples. While attendees complete each lab, instructors will walk to each station to ensure they are progressing. An instructor also will walk through each lab while participants are given a PDF lab guide that contains all the lab scenarios, questions and detailed answers, including many screenshots and explanations. Participants can then use the course slides and lab guide to practice labs over time as well as guide them through real-world investigations of compromised systems. By attending this workshop, participants will leave knowing the most effective ways to detect modern Windows malware using the latest version of the most widely used open-source framework for memory analysis.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Andrew Case",
"pid": 51320159,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10308790/888ff1bbdda852d8dc6360b6e1a9279d.jpeg",
"profile_id": 51320159,
"first_name": "Andrew",
"last_name": "Case",
"aff": "Volexity",
"title": "Director of Research",
"industry": "",
"loc": "Metairie, Louisiana, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Hala Ali",
"pid": 50917484,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/0099b06851f1df7e11fc2c3eb8d7b9a4fd81e323ced68e3a1385c730463344cc_1/Ali.jpeg",
"profile_id": 50917484,
"first_name": "Hala",
"last_name": "Ali",
"aff": "Virginia Commonwealth University",
"title": "Research Assistant",
"industry": "",
"loc": "Richmond, Virginia",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-11 16:30:00",
"sessions": [
{
"id": 5079241,
"name": "Workshop: Build, Break, Defend: Securing the Model Context Protocol in Action",
"start_time": "16:30",
"end_time": "18:15",
"calendar_stime": "2026-03-11 16:30:00",
"calendar_etime": "2026-03-11 18:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EThe Model Context Protocol (MCP), open-sourced by Anthropic in late 2024, has quickly become foundational to modern agentic workflows, enabling AI systems to dynamically interact with tools, data sources and APIs. With this flexibility comes a new class of vulnerabilities that traditional security models fail to capture.\u003Cbr\u003EIn this hands-on, challenge-driven workshop, participants will be introduced to the fundamentals of MCP — its architecture, components and role in enabling agentic interoperability. Through guided exercises, they’ll build a toy MCP server, gaining an understanding of how an MCP setup works as well as tool registration, resource endpoints and request–response flows.\u003Cbr\u003ETeams will move into a CTF-style break phase, exploiting intentionally vulnerable MCP instances to capture flags tied to issues such as context poisoning, naming impersonation and over-permissive tool integrations. This interactive format encourages participants to think like attackers, share discoveries and connect exploits to underlying design weaknesses.\u003Cbr\u003EFinally, the session will transition to defense, where participants will apply structured threat-modeling frameworks - STRIDE and MITRE ATLAS - to collaboratively design practical mitigations for MCP-based systems.\u003Cbr\u003ENo prior MCP experience is needed, just a laptop, GitHub account, code editor and, most importantly, curiosity. Code scaffolds and lab guides will be provided.\u003Cbr\u003EKey takeaways will be learning how to design, deploy and reason about MCP servers and agent integrations; the unique vulnerabilities introduced by MCPs and how they differ from traditional APIs; practical CTF-style experience in exploiting and defending MCPs; and framework for threat modeling and securing next-generation agentic architectures.\u003C/p\u003E",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Shruti Datta Gupta",
"pid": 51320164,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8957199/1c61d9f7dcc7d12a76fa21c7747dcd29.jpeg",
"profile_id": 51320164,
"first_name": "Shruti",
"last_name": "Datta Gupta",
"aff": "Adobe",
"title": "Product Security Engineer",
"industry": "",
"loc": "San Francisco, California",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Spandana Gorantla",
"pid": 51320166,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9010928/c8564d5baad541474c16b4915a9d650c.jpeg",
"profile_id": 51320166,
"first_name": "Spandana",
"last_name": "Gorantla",
"aff": "Adobe ",
"title": "Sr. Product Security Engineer",
"industry": "",
"loc": "Austin, Texas, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
]
]
],
[
"18:30",
[
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-11 18:30:00",
"sessions": [
{
"id": 5079242,
"name": "INVITE ONLY: ISC2 Networking Event",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-11 18:30:00",
"calendar_etime": "2026-03-11 19:15:00",
"place": "Chesapeake 10",
"docs": [],
"session_order": 25,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
],
[],
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-11 18:30:00",
"sessions": [
{
"id": 5079243,
"name": "INVITE ONLY: Security Training Scholarship Networking Event",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-11 18:30:00",
"calendar_etime": "2026-03-11 19:15:00",
"place": "Maryland D",
"docs": [],
"session_order": 26,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
],
[],
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-11 18:30:00",
"sessions": [
{
"id": 5079244,
"name": "INVITE ONLY: Target Cyber Defense Challenge Top 10 Networking Event",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-11 18:30:00",
"calendar_etime": "2026-03-11 19:15:00",
"place": "Chesapeake 12",
"docs": [],
"session_order": 27,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
],
[],
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-11 18:30:00",
"sessions": [
{
"id": 5079245,
"name": "INVITE ONLY: Volunteer MeetUp",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-11 18:30:00",
"calendar_etime": "2026-03-11 19:15:00",
"place": "Maryland C",
"docs": [],
"session_order": 28,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
],
[],
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-11 18:30:00",
"sessions": [
{
"id": 5079246,
"name": "INVITE ONLY: Program & Scholarship Committee MeetUp",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-11 18:30:00",
"calendar_etime": "2026-03-11 19:15:00",
"place": "Chesapeake D",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(68, 71, 70); font-family: 'Google Sans Text', 'Google Sans', Helvetica, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: no-contextual; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(221, 227, 234); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EJoin the Conference Program Committee & Scholarship Committee for a casual networking event. \u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 29,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
]
]
],
[
"19:30",
[
[
{
"start_time": "07:30 PM",
"calendar_stime": "2026-03-11 19:30:00",
"sessions": [
{
"id": 5139142,
"name": "Socials: Sponsored by Google & Palo Alto Networks",
"start_time": "19:30",
"end_time": "21:30",
"calendar_stime": "2026-03-11 19:30:00",
"calendar_etime": "2026-03-11 21:30:00",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [
[
{
"id": 5171102,
"name": "Social Hosted by Google",
"start_time": "19:30",
"end_time": "21:30",
"calendar_stime": "2026-03-11 19:30:00",
"calendar_etime": "2026-03-11 21:30:00",
"place": "Chesapeake 7-9",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": [],
"session_id": 5139142,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5171103,
"name": "Social Hosted by Palo Alto Networks",
"start_time": "19:30",
"end_time": "21:30",
"calendar_stime": "2026-03-11 19:30:00",
"calendar_etime": "2026-03-11 21:30:00",
"place": "Chesapeake G-I",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": [],
"session_id": 5139142,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
}
]
],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:30 PM"
}
]
]
]
],
"type": "Normal",
"formatted_date": "Wednesday, March 11, 2026"
},
{
"date": "Mar 12, 2026",
"day": "Thu",
"time_ranges": [
[
"07:30",
[
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-12 07:30:00",
"sessions": [
{
"id": 5079247,
"name": "Badge PickUp",
"start_time": "07:30",
"end_time": "19:00",
"calendar_stime": "2026-03-12 07:30:00",
"calendar_etime": "2026-03-12 19:00:00",
"place": "Convention Center Pre-Function",
"docs": [],
"session_order": 30,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "07:00 PM"
}
],
[],
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-12 07:30:00",
"sessions": [
{
"id": 5151168,
"name": "Information Desk Open",
"start_time": "07:30",
"end_time": "18:30",
"calendar_stime": "2026-03-12 07:30:00",
"calendar_etime": "2026-03-12 18:30:00",
"place": "Chesapeake 2",
"docs": [],
"session_order": 31,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:30 PM"
}
],
[],
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-12 07:30:00",
"sessions": [
{
"id": 5151180,
"name": "Quiet/Reflection Room",
"start_time": "07:30",
"end_time": "22:30",
"calendar_stime": "2026-03-12 07:30:00",
"calendar_etime": "2026-03-12 22:30:00",
"place": "National Harbor 1",
"docs": [],
"session_order": 32,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "10:30 PM"
}
]
]
],
[
"08:00",
[
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-12 08:00:00",
"sessions": [
{
"id": 5079249,
"name": "INVITE ONLY: Pre Keynote Early Career Breakfast Panel Sponsored by Bloomberg (must arrive by 8:05am to eat)",
"start_time": "08:00",
"end_time": "09:00",
"calendar_stime": "2026-03-12 08:00:00",
"calendar_etime": "2026-03-12 09:00:00",
"place": "National Harbor 2-3",
"desc": "\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EStart the day with an interactive “Ask Me Anything” pre-keynote breakfast panel designed for early career cybersecurity professionals. This session offers a welcoming space to hear from experienced industry leaders and gain practical insights into building a successful career in cybersecurity.\u003C/span\u003E\u003C/p\u003E\n\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThrough guided discussion and networking, you’ll explore career paths and gain real-world perspectives from industry professionals at Bloomberg while enjoying breakfast. Whether you’re seeking advice or connections with fellow early career professionals, this session is designed to support your growth and help you navigate the next steps in your cybersecurity journey. \u003C/span\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThe program begins at 8:15am ET.\u003C/span\u003E\u003C/p\u003E\n\u003Cp\u003E \u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-12 08:00:00",
"sessions": [
{
"id": 5079250,
"name": "INVITE ONLY: Pre Keynote Mid Career Breakfast Panel Sponsored by Bloomberg, JPMorganChase & Netflix (must arrive by 8:05am to eat)",
"start_time": "08:00",
"end_time": "09:00",
"calendar_stime": "2026-03-12 08:00:00",
"calendar_etime": "2026-03-12 09:00:00",
"place": "Maryland A",
"desc": "\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EStart the day with an interactive “Ask Me Anything” pre-keynote breakfast panel designed for mid career cybersecurity professionals. This session offers a welcoming space to hear from experienced industry leaders and gain practical insights into building a successful career in cybersecurity.\u003C/span\u003E\u003C/p\u003E\n\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThrough guided discussion and networking, you’ll explore career paths and gain real-world perspectives from industry professionals at Bloomberg, JPMorganChase, and Netflix while enjoying breakfast. Whether you’re seeking advice or connections with fellow mid career professionals, this session is designed to support your growth and help you navigate the next steps in your cybersecurity journey. \u003C/span\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThe program begins at 8:15am ET.\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-12 08:00:00",
"sessions": [
{
"id": 5079251,
"name": "Poster Session CheckIn",
"start_time": "08:00",
"end_time": "09:00",
"calendar_stime": "2026-03-12 08:00:00",
"calendar_etime": "2026-03-12 09:00:00",
"place": "Potomac Registration Desk A",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-12 08:00:00",
"sessions": [
{
"id": 5079252,
"name": "Career Fair Setup by Sponsors",
"start_time": "08:00",
"end_time": "10:00",
"calendar_stime": "2026-03-12 08:00:00",
"calendar_etime": "2026-03-12 10:00:00",
"place": "Prince George's Hall E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "10:00 AM"
}
]
]
],
[
"08:15",
[
[
{
"start_time": "08:15 AM",
"calendar_stime": "2026-03-12 08:15:00",
"sessions": [
{
"id": 5079248,
"name": "Breakfast Available for Scholarship Recipients",
"start_time": "08:15",
"end_time": "09:00",
"calendar_stime": "2026-03-12 08:15:00",
"calendar_etime": "2026-03-12 09:00:00",
"place": "Prince George's Hall A",
"docs": [],
"session_order": 31,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
]
]
],
[
"09:15",
[
[
{
"start_time": "09:15 AM",
"calendar_stime": "2026-03-12 09:15:00",
"sessions": [
{
"id": 5079253,
"name": "Opening & Keynote (doors open 9:00 am)",
"start_time": "09:15",
"end_time": "10:15",
"calendar_stime": "2026-03-12 09:15:00",
"calendar_etime": "2026-03-12 10:15:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 36,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27637,
"name": "Keynote",
"session_ids": [5079253, 5079275, 5079309, 5079316]
}
]
}
],
"nonparallel": false,
"end_time": "10:15 AM"
}
]
]
],
[
"10:15",
[
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079254,
"name": "Break",
"start_time": "10:15",
"end_time": "10:45",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 10:45:00",
"docs": [],
"session_order": 37,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27638,
"name": "Break",
"session_ids": [5079254, 5079287, 5079317]
}
]
}
],
"nonparallel": false,
"end_time": "10:45 AM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079255,
"name": "Poster Session CheckIn",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Potomac Registration Desk A",
"docs": [],
"session_order": 38,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079256,
"name": "Career Fair Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Prince George's Hall E",
"docs": [],
"session_order": 39,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079257,
"name": "Career Growth Hub and Headshots Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "National Harbor 6-8",
"docs": [],
"session_order": 40,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079258,
"name": "CTF (Capture The Flag) Coaching Available",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "National Harbor 10-11",
"docs": [],
"session_order": 41,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-12 10:15:00",
"sessions": [
{
"id": 5079259,
"name": "WiCyS Store Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-12 10:15:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "National Harbor 4-5",
"docs": [],
"session_order": 42,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"10:30",
[
[
{
"start_time": "10:30 AM",
"calendar_stime": "2026-03-12 10:30:00",
"sessions": [
{
"id": 5079260,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "10:30",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:30:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 43,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
]
]
],
[
"10:45",
[
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079261,
"name": "Presentation: Hacked Hearts: Unmasking Vulnerabilities in Medical IoT Devices",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland A",
"desc": "\u003Cp\u003ECybersecurity changes at a stunning pace, yet medical IoT devices lag despite having exploded within healthcare settings. Worldwide IoT devices account for 19.8 billion in 2025 and are forecasted to exceed 40.6 billion by 2034, amplifying exposure that places patient data and lives at unprecedented risk. This session addresses the growing imperative of addressing IoT security, connecting to medical device threats with an end-to-end case study on the Contec CMS8000 patient monitor.\u003Cbr\u003EThe presentation concerns CMS8000's crippling vulnerabilities, CVE-2025-0626 (hard-coded IP in-bundled backdoor) and CVE-2025-0683 (patient data exfiltration). This backdoor reverse shell launches on boot, binding to a remote IP to share NFS, downloads and executes unvalidated files, updates firmware, streams critical signs data (ECG, heart rate, SpO2) and enables remote code execution without authentification.\u003Cbr\u003EEffects are drastic: attackers can potentially alter device settings, causing false readings and inappropriate patient care with resulting injury or death. Data leaks compromise privacy while system disruptions affect hospital procedures. Mitigation controls, such as network segmentation, zero-trust models and FDA guidelines are covered alongside assessment issues, including outdated hardware and regulatory limitations. Drawing from current research, the session gives participants practical tools for risk detection and advocacy of stronger protections in healthcare IoT.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Spandana Gurivireddy",
"pid": 51320172,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10285146/0da0275accb132992639e67a090d4ea3.jpeg",
"profile_id": 51320172,
"first_name": "Spandana",
"last_name": "Gurivireddy",
"aff": "University of Texas, San Antonio",
"title": "Graduate Student",
"industry": "",
"loc": "San Antonio, Texas, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079290,
"name": "Presentation: AI Tutors in Cyber Education: Reducing Cognitive Load and Expanding Hands-On Access",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland B",
"desc": "\u003Cp\u003ECybersecurity education has long relied on static materials and peer forums, but learners today increasingly turn to AI tutors such as ChatGPT for real-time, adaptive help. In this session, the presernter will share findings from graduate research comparing AI tutors with traditional resources like YouTube and online forums during hands-on challenges in gamified environments such as TryHackMe.\u003Cbr\u003EResults demonstrated that AI tutors reduced mental effort and improved task completion rates, particularly among early-career learners, while advanced participants benefited most when combining both AI and traditional supports. Participants described AI assistance as “mentally lighter,” yet still depended on community examples for deeper understanding.\u003Cbr\u003EThese results suggest that AI tutors can lower cognitive barriers to entry in cybersecurity learning but only when implemented as part of a blended learning ecosystem. This talk introduces a framework grounded in Cognitive Load Theory and microlearning principles to guide educators and trainers in designing balanced, human-centered curricula. Attendees will gain practical strategies for integrating AI assistance ethically and effectively in labs, bootcamps or online classrooms.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Esther Stepansky",
"pid": 51320174,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/2c45e870cca249f7f246ae46bc4395f3b4d65b60c6904d84602704fbe536de27_1/Stepanksy.jpeg",
"profile_id": 51320174,
"first_name": "Esther",
"last_name": "Stepansky",
"aff": "Georgia Institute of Technology",
"title": "Graduate Student",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079263,
"name": "Presentation: Hallucination Defense: Securing LLMs Against Prompt Injection and False Knowledge Leaks",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland C",
"desc": "\u003Cp\u003ELarge language models (LLMs) are transforming cybersecurity, content analysis and enterprise automation, yet they introduce an entirely new attack surface. Adversaries can now talk their way past defenses, crafting malicious prompts that override instructions, extract confidential data or insert false knowledge into downstream systems. At the same time, model hallucinations and confidently wrong outputs create fertile ground for misinformation and trust erosion.\u003Cbr\u003EThis presentation introduces a practical framework for Hallucination Defense, combining prompt-injection mitigation with output-verification pipelines. The session explains how attackers exploit context windows, chain-of-thought leakage and retrieval-augmented generation endpoints and demonstrates methods to build guardrails without sacrificing model performance. Key defensive strategies include input validation, sandboxed execution, structured prompt templates and post-generation fact-checking through retrieval APIs or lightweight classifiers.\u003Cbr\u003EAccessible architectural diagrams and concise demonstrations illustrate how to design LLM applications that are resilient, privacy-aware and auditable. Attendees will gain a step-by-step blueprint for strengthening AI systems through layered defense techniques that are adaptable for developers, researchers and security professionals.\u003Cbr\u003EUltimately, the presentation reframes hallucinations and prompt-injection attacks not as quirks of AI behavior but as cyber vulnerabilities requiring a defense-in-depth approach for the era of generative intelligence.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Diana Bayandina",
"pid": 51320178,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8957384/f7032bef69069fe8f6de7fc0059f4ae4.jpeg",
"profile_id": 51320178,
"first_name": "Diana",
"last_name": "Bayandina",
"aff": "BayMind AI Solutions",
"title": "Founding Software Engineer",
"industry": "",
"loc": "New York, New York, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079264,
"name": "Presentation: Human Communication at Machine Speed: Critical Vulnerability Response",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland D",
"desc": "\u003Cp\u003ESupply chain attacks aren't slowing down, they're accelerating. What began with watershed moments like Log4j and SolarWinds has evolved into a constant stream of critical vulnerabilities, each accompanied by panic-inducing headlines that rarely help practitioners respond effectively.\u003Cbr\u003EAs part of different teams that have responded to major supply chain incidents and the countless \"critical\" CVEs since, the presenter has seen a persistent pattern – technical response capabilities have improved dramatically, but communication still breaks down. Clear, systematic communication remains the difference between coordinated action and organizational chaos, yet most teams lack a practical framework for crisis communications.\u003Cbr\u003EThis talk presents a battle-tested communication framework for guiding organizations from supply chain attack detection through remediation. Drawing from real incident response experience across vendor and enterprise environments, the presenter will share what actually works for structuring messages across audiences: engineering teams who need immediate action, executives who need business impact assessment and customers who deserve transparent guidance without unnecessary alarm.\u003Cbr\u003EWhether participants use AI tools, traditional templates or write from scratch, the core challenge persists – communicating systematically to humans under pressure. Attendees will learn how frameworks ensure everyone gets critical information when English might not be their first language, adrenaline is running high or they're simultaneously coordinating across dozens of teams.\u003Cbr\u003EParticipants will leave with practical, immediately implementable frameworks and processes, ready for the next critical vulnerability that's inevitably coming.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Beatriz Datangel",
"pid": 51320182,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/4c304f994126e35d592773f547173652177bdc8bd36256ebbe2f59c64d6ee554_1/Datangel.jpeg",
"profile_id": 51320182,
"first_name": "Beatriz",
"last_name": "Datangel",
"aff": "Root",
"title": "",
"loc": "San Francisco",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079265,
"name": "Presentation: The Ballerina CISO: Every Door Is a Door – Crafting Your Cybersecurity Path",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EBreaking into cybersecurity can feel gated, especially for women who are told to come back when they tick every box. In this highly interactive session, the presenter will turn that on its head. Using the presenter's experience going from a professional ballerina to CIO/CISO and transformation leader, she will help attendees translate nontraditional experience into cyber value, map roles to skills (SOC, engineering, GRC/compliance, audit, detection/IR), and build a 90-day “learn-do-signal” plan to start immediately. Participants will leave with a transferable skills map, an ROI rubric for education vs. certifications vs. on-the-job learning, and tested outreach scripts for reaching across, reaching up and asking for help. Attendees should come ready to design the next move and walk out with the words, the plan and the confidence to use them.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Carrie Nedrow",
"pid": 51320191,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10304981/503cea155be847e1c2c583f2f75335fc.jpeg",
"profile_id": 51320191,
"first_name": "Carrie",
"last_name": "Nedrow",
"aff": "enduring-solutions.com",
"title": "vCIO, vCISO, VP IT, Digital Transformations, Technology Strategy, PMO",
"industry": "",
"loc": "Los Angeles, California",
"bio": "Technology leadership is most powerful when it enables transformation—not just operations. I lead at the intersection of enterprise strategy and AI-accelerated execution, aligning secure systems with the “super speed” required for modern growth.Across roles as CIO | CISO | Transformation Executive, I’ve moved beyond traditional digital transformation to AI-Augmented Leadership. I don’t just implement tools; I institutionalize Value Realization. By integrating a sophisticated stack (Gemini/Gems | Workato | GitHub | CoPilot), I empower organizations to move at incredible velocity—turning weeks of manual analysis into hours of strategic action.My work spans healthcare | fintech | SaaS—driving cloud-native modernization while embedding rigorous compliance (HIPAA | SOX) and deploying AI-driven insights that scale executive decision-making.Key Transformations:AI Orchestration & Super Speed: Hardwired AI-driven automation (Workato | Gemini | MS Copilot) into cross-functional operations.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-12 10:45:00",
"sessions": [
{
"id": 5079266,
"name": "Lightning Talks",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"place": "Maryland 4-6",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [
[
{
"id": 5125200,
"name": "AI Isn’t Replacing You, It’s Promoting Those Who Adapt",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"desc": "\u003Cp\u003EEntry-level jobs are disappearing faster than ever before. In the past year alone, graduate job postings have dropped by more than 30% while 7 in 10 adults worry their jobs will be replaced by AI. But the truth is more nuanced; it’s not AI itself eliminating opportunity, It’s the lack of adaptability in how people hire, train and learn.\u003C/p\u003E\n\u003Cp\u003EIn this session, presenters will unpack what the “jobpocalypse” really means for the cybersecurity workforce and explore how professionals at every level can future-proof their careers. From law firms automating document reviews to tech giants pausing junior hiring, the pattern is clear – the first rung of the career ladder is shifting not disappearing.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with three actionable takeaways: understand how AI is changing entry-level hiring and skills expectations; identify AI-proof skills such as human judgment, communication and creative problem-solving; and learn how to use AI as an amplifier not a threat.\u003C/p\u003E\n\u003Cp\u003EAI won’t replace cybersecurity professionals, but professionals who use AI effectively will replace those who don’t. The future belongs to the curious not the comfortable.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51320258,
"name": "Maria Joseph",
"first_name": "Maria",
"last_name": "Joseph",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079266,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125232,
"name": "Unmute Yourself: Using AI to Become a Confident Speaker",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"desc": "\u003Cp\u003EIn cybersecurity, people are trained to protect systems. Too often they forget to protect something equally valuable – their voice. Many brilliant women in tech hold back from sharing ideas, leading discussions or speaking on stage not because they lack expertise but because they lack confidence. AI is changing that.\u003C/p\u003E\n\u003Cp\u003EThis session explores how AI-powered platforms are revolutionizing the way people prepare, practice and present. From generating clear, concise narratives to analyzing tone, pace and audience engagement, AI can serve as a virtual coach that helps transform anyone's communication skills. \u003Cbr\u003EDrawing from a personal journey – from someone who grew up with a stutter and feared public speaking to delivering a TEDx talk and speaking at major tech conferences – the presenter will show how AI can empower even the quietest voices to lead boldly and speak with impact.\u003C/p\u003E\n\u003Cp\u003EAttendees will walk away with practical tools and strategies to use AI for: crafting strong, story-driven presentations from technical content; receiving personalized, real-time feedback to refine delivery and build confidence; and turning preparation into empowerment so people are not just ready to speak but to inspire.\u003C/p\u003E\n\u003Cp\u003EIn a field where clarity and confidence are key, this session will help attendees unmute themselves, leverage AI as an ally and deliver messages that leave a lasting impression.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": [
{
"pid": 50917562,
"name": "Yvonne Foo",
"first_name": "Yvonne",
"last_name": "Foo",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079266,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125235,
"name": "Hired – and Hacked: The Hidden Dangers in Job Applications",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"desc": "\u003Cp\u003EWhat if a dream job application turned into a cyberattack?\u003Cbr\u003EJob hunting is a stressful and often obscure process in which applicants are frequently put in the vulnerable state of being rushed through the application process with unfamiliar counterparties. Applicants often are too emotionally charged to catch typical red flags they would have otherwise avoided, and attackers know this.  \u003Cbr\u003EThis talk details a real-world case study of a social engineering attack, where a user was compromised while applying for a role from a fake job posting. In this attack, the user, believing they were engaging in legitimate pre-screening, was successfully convinced to run a simple, yet highly malicious, curl command in their system shell, downloading and executing a persistent keylogger designed to steal credentials and exfiltrate data off their machine.\u003Cbr\u003EThis talk demonstrates how a combination of social engineering and technical deception can target even security-aware individuals, emphasizing the human element in cybersecurity. This session will dissect the attack chain, from the initial social engineering lure to execution of the keylogger, and provide a rapid-fire review of the immediate incident response steps and remediation steps. Attendees will leave with practical, immediate takeaways on how to recognize red flags in applications and prioritize vigilance even when under pressure. This case study underscores the importance of the human element in system security and provides a powerful cautionary tale for security professionals and students alike.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51320771,
"name": "Ida Musheyev-Polishchuk",
"first_name": "Ida",
"last_name": "Musheyev-Polishchuk",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079266,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125240,
"name": "The Cloud Security Horizon: Emerging Innovations and Challenges",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"desc": "\u003Cp\u003ECloud adoption has transformed how organizations build, scale and defend their digital ecosystems, but with this shift comes a new wave of challenges. Traditional perimeter-based security models no longer apply, and the complexity of multi-cloud environments has amplified risks such as misconfigurations, identity sprawl and fragmented visibility. To secure the cloud, people must move beyond legacy thinking and embrace architectures designed for resilience, adaptability and trust in a borderless world.\u003C/p\u003E\n\u003Cp\u003EThis session explores the future of secure cloud architecture through the lens of innovation and vision. From the rise of zero trust and AI-driven defense mechanisms to the promise of confidential computing and self-healing systems, attendees will gain insights into how cloud security is evolving to meet emerging threats. Real-world experiences and lessons learned will be distilled into practical strategies that security leaders can bring back to their organizations while also highlighting broader industry shifts that will shape the next decade of cloud security.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with three key takeaways: fresh perspectives on persistent cloud security challenges, practical strategies drawn from real-world implementations and awareness of emerging trends that will redefine resilience and privacy in the cloud era.\u003C/p\u003E",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51320773,
"name": "Krishnaveni Palanivelu",
"first_name": "Krishnaveni",
"last_name": "Palanivelu",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079266,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125245,
"name": "From Capability to Impact: Leadership Visibility in the Age of AI",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-12 10:45:00",
"calendar_etime": "2026-03-12 11:30:00",
"desc": "\u003Cp\u003EAs artificial intelligence (AI) reshapes cybersecurity and privacy, technical expertise alone is no longer sufficient to drive influence or advancement. Through the Create Your Leading Edge℠ leadership accelerator – developed in partnership with Women in CyberSecurity – a clear pattern has emerged: many early- and mid-career women already possess the critical expertise organizations need, yet their contributions are often undervalued due to perceived leadership readiness rather than actual performance.\u003C/p\u003E\n\u003Cp\u003EThis session examines why leadership visibility becomes an even stronger signal in AI-driven environments and why technical excellence alone is becoming less visible. Participants will be introduced to one practical mindset shift that helps translate capability into recognized impact. The session reframes visibility not as self-promotion but as a professional responsibility, ensuring diverse expertise is seen, trusted and leveraged in a rapidly evolving threat landscape.\u003C/p\u003E",
"docs": [],
"session_order": 8,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51320777,
"name": "Karen Worstell",
"first_name": "Karen",
"last_name": "Worstell",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079266,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
}
]
],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
}
],
"tags": []
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
]
]
],
[
"11:45",
[
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079267,
"name": "Birds of A Feather: Five Mistakes Everyone Makes with AI — and How to Fix Them",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland A",
"desc": "\u003Cp\u003EAI tools are transforming how we communicate, learn and make decisions, but most people are using them without realizing the risks. This interactive session creates space for open dialogue on how to use AI responsibly and effectively. Together, participants will unpack common missteps — from trusting unverified outputs to oversharing personal data — and explore practical solutions that empower users to think critically, protect privacy and maintain ethical standards. Through collaborative discussion, participants will share their experiences with tools like ChatGPT, Gemini or Copilot and identify strategies that make AI a trustworthy assistant rather than a risky shortcut. The session concludes with the creation of an “AI Smart User Checklist,” built from collective insights. This session encourages authentic, non-technical conversation about the role of human judgment in the age of automation, offering takeaways every attendee can apply immediately.\u003C/p\u003E",
"docs": [],
"session_order": 50,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Litany Lineberry",
"pid": 50917504,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/91bc11bd9aac831c06c6270dca698ff1.jpeg",
"profile_id": 50917504,
"first_name": "Litany",
"last_name": "Lineberry",
"aff": "Hinds Community College",
"title": "Instructor of Information Systems Technology",
"industry": "",
"loc": "Starkville, Mississippi, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079268,
"name": "Birds of A Feather: Harnessing the Hype: Operationalizing AI Governance at Scale",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EAs AI becomes deeply embedded in enterprise systems, organizations face mounting pressure to move beyond aspirational principles and toward practical, scalable governance. This session invites cybersecurity and privacy professionals to engage in an open discussion on operationalizing AI governance in real-world environments. Facilitated by a practitioner working at the intersection of AI risk, cybersecurity, compliance and data ethics, the session will explore how to align safeguards with emerging regulations (e.g., NIST AI RMF, EU AI Act), embed risk management into AI workflows and enable cross-functional teams to scale responsibly. Participants will share challenges and successes in implementing governance frameworks, discuss strategies for balancing innovation with accountability, and examine how cybersecurity and privacy teams can play a pivotal role in shaping trustworthy AI systems. Whether participants are just beginning to explore AI governance or actively building internal programs, this session offers a collaborative space to exchange ideas, ask questions and leave with actionable insights.\u003C/p\u003E",
"docs": [],
"session_order": 51,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Grace Llojaj",
"pid": 51320781,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10285001/9b024794e3d8e82dc5556aad84c6c2ce.jpeg",
"profile_id": 51320781,
"first_name": "Grace",
"last_name": "Llojaj",
"aff": "SEI",
"title": "Senior Consultant - Security, Risk, & Compliance",
"loc": "Washington, D.C., Washington, D.C.",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079269,
"name": "Birds of A Feather: AI in Cybersecurity Education: Opportunities, Ethics and the Future of Learning",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EAs AI becomes central to threat detection, analysis and automation, it also opens powerful new possibilities for how cybersecurity is taught and learned. This session invites educators, students and industry professionals to engage in an open conversation about the promise, challenges and ethical implications of integrating AI into cybersecurity education.\u003C/p\u003E\n\u003Cp\u003EParticipants will explore how AI-driven tools such as generative AI assistants, adaptive learning platforms and intelligent simulations can personalize instruction, accelerate skill development, and bridge the gap between academic theory and real-world practice. At the same time, the session will examine the risks of overreliance on AI, data privacy concerns, and the need to preserve integrity, creativity and human judgment in the learning process.\u003C/p\u003E\n\u003Cp\u003EThrough shared experiences, guiding questions and collaborative discussion, this session aims to identify effective strategies and frameworks for embedding AI into cybersecurity curricula responsibly. Attendees will leave with a deeper understanding of how to prepare the next generation of cyber professionals to both leverage AI as a tool and defend against it as a threat while maintaining the ethical and analytical mindset essential to the profession.\u003C/p\u003E",
"docs": [],
"session_order": 52,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Maria Weber",
"pid": 51320788,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/4170ad48c60fea70500093aa9c344a2679c83b07009acf07435c7774fa732052_1/Weber.jpeg",
"profile_id": 51320788,
"first_name": "Maria",
"last_name": "Weber",
"aff": "Saint Louis University",
"title": "Director of Master of Cybersecurity",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 0
},
{
"name": "Dhananjay Singh",
"pid": 51320789,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/47e07027917d4083fd540b7da84543ce345289aba1b5dbb3f9642411d2bce9b5_1/Singh.jpeg",
"profile_id": 51320789,
"first_name": "Dhananjay",
"last_name": "Singh",
"aff": "Pennsylvania State University",
"title": "Professor",
"industry": "",
"loc": "State College, Pennsylvania",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079270,
"name": "Birds of A Feather: Capable vs. Qualified: Reframing Readiness and Owning Your Story",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EIn cybersecurity and technology, many women count themselves out of opportunities because they don’t meet every qualification listed. Yet capability, grit and adaptability often matter far more than checking every box. This interactive session invites participants to challenge traditional definitions of qualified and view themselves, and others, through the lens of capability and transferable skills gained from past experiences.\u003C/p\u003E\n\u003Cp\u003EThrough shared experiences and open discussion, this session will explore how self-perception, job descriptions and workplace culture influence confidence and career decisions. Participants will learn to reframe what readiness looks like, own their professional narratives, and apply practical strategies to bridge the gap between qualifications and capability. Together, participants will discuss ways to translate lived experiences, curiosity and resilience into career momentum and how leaders can create cultures that empower growth beyond the feeling of ready.\u003C/p\u003E\n\u003Cp\u003ESometimes the next best step begins before feeling perfect.\u003C/p\u003E",
"docs": [],
"session_order": 53,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Desiree Driver",
"pid": 51320800,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10284975/253c4a98d5a50be7e47305eba581fdd5.jpeg",
"profile_id": 51320800,
"first_name": "Desiree",
"last_name": "Driver",
"aff": "Leidos",
"title": "Program Manager",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079271,
"name": "Birds of A Feather: Microfeminism: Small Acts, Big Impact in Cybersecurity Workplace",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003ECreating inclusive cultures in cybersecurity workplaces isn't just about policy change; it's about the small, daily actions people take. Microfeminism is the practice of challenging gender inequality through everyday behaviors: amplifying voices in meetings, ensuring fair credit for contributions and dismantling subtle biases in technical spaces.\u003C/p\u003E\n\u003Cp\u003EAs the only woman in the leadership team managing an all-male security team, the presenter learned that transformation doesn't require authority, it requires intention. Whether participants are leading a team, contributing as an individual or navigating as the only woman in the room, anyone has the power to shift culture through micro-actions.\u003C/p\u003E\n\u003Cp\u003EThis interactive session invites participants to share their experiences, challenges and strategies for practicing microfeminism in cybersecurity workplaces. Attendees are encouraged to bring their stories,  frustrations and ideas. Through facilitated discussion and collaborative problem solving, the group will explore real examples from male-dominated teams, identify common barriers and build a collective toolkit of actionable techniques to implement. Everyone will leave with specific practices, connections to others facing similar challenges and a renewed sense of agency to drive change in the workplace.\u003C/p\u003E",
"docs": [],
"session_order": 54,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Emma Fang",
"pid": 50917479,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202506/62b43ca4168b4bb4fc8ad95525a81213d8c86d777a1f90eae586e45bb3d81ab9_1/Fang.jpeg",
"profile_id": 50917479,
"first_name": "Emma",
"last_name": "Fang",
"aff": "EPAM Systems",
"title": "Senior Security Architect, Senior Manager",
"bio": "Emma is a Senior Security Architect at EPAM, specialising in developing and executing security strategies and architecting cloud solutions. With over 10 years of experience in cyber, she has led projects and technical workshops focused on cloud transformation and cloud-native application development. Beyond her professional role, Emma is dedicated to advocate for a more diverse cyber workforce through community volunteering and public speaking. She is a passionate mentor, volunteers at the leadership team of WiCyS UK&I affiliate, Google's Techmakers ambassador, and serves as a member of Industry Advisory Board at the University of Buckingham in the UK.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079272,
"name": "Birds of A Feather: Rooted and Rising: Immigrant Journeys in Tech and Cyber",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Maryland 4-6",
"desc": "\u003Cp\u003EThe immigrant journey is more than relocation. It is a story of roots and resilience, of staying grounded while rising to new challenges. In cybersecurity, immigrants often carry the dual weight of proving technical excellence while navigating cultural, systemic and personal borders. For immigrant women, this burden is multiplied, yet, so too is the strength that emerges. Anchored in lived experiences, this discussion will explore the personal and professional dimensions of building a career in cybersecurity and related fields while navigating identity, belonging and resilience.\u003C/p\u003E\n\u003Cp\u003EThis session is designed as an open, safe and validating space for dialogue. Participants are invited to share their own perspectives, challenges and triumphs, creating a collective conversation that honors both struggle and strength. Themes may include navigating immigration processes, balancing cultural identities, handling barriers to advancement, and celebrating the adaptability and perseverance that define immigrant journeys. The “rooted and rising” framing emphasizes two truths: that immigrants remain grounded in their heritage while continuing to grow, contribute and thrive in the ever-evolving landscape of technology. Attendees can expect an interactive, supportive conversation that affirms their experiences, strengthens community bonds and inspires them to rise higher together.\u003Cbr\u003EThis session is not about providing answers; It’s about presence, connection and recognition.\u003C/p\u003E",
"docs": [],
"session_order": 55,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Dawn Butler",
"pid": 51320806,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9027813/ee705581f33a40d49ff8c387a8e0a63f.jpeg",
"profile_id": 51320806,
"first_name": "Dawn",
"last_name": "Butler",
"aff": "CDWY (Founder | Fractional)",
"title": "Cyber Governance & IT Operations Lead",
"loc": "Washington, D.C., Washington, D.C.",
"bio": "With extensive experience in technology and cybersecurity, I'm embarking on an exciting journey to revolutionize how we develop and empower the next generation of cyber talent. Known for my strong communication skills and charisma, I excel at networking and building meaningful professional relationships.\r\n\r\nAs founder of CDWY, dedicated to empowering underrepresented individuals in the technology field, with a focus on BIPOC women technologists. My mission is to help women in tech navigate their careers, move from isolation to finding safety and validation within a community that understands their unique experiences.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-12 11:45:00",
"sessions": [
{
"id": 5079273,
"name": "Male Allyship Meetup",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-12 11:45:00",
"calendar_etime": "2026-03-12 12:30:00",
"place": "Chesapeake ABC",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EThe strength of cybersecurity and WiCyS lies in the strength of the community. This \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan class=\"il\"\u003Emeetup\u003C/span\u003E\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E is designed for all allies committed to being proactive advocates for women and underrepresented groups in the field. The goal of this \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan class=\"il\"\u003Emeetup\u003C/span\u003E\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E is to move beyond the theory of \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan class=\"il\"\u003Eallyship\u003C/span\u003E\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E into its practice. Whether you are already leading initiatives or you’re just starting to ask, \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; font-style: italic;\"\u003E\"How can I help?”\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E All conference attendees are welcome! This is a space for cybersecurity allies to step into the conversation, listen, and build networks to encourage valuable change in our industry.\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 56,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"12:30",
[
[
{
"start_time": "12:30 PM",
"calendar_stime": "2026-03-12 12:30:00",
"sessions": [
{
"id": 5079274,
"name": "Lunch & Networking (must be seated by 12:40 pm to eat)",
"start_time": "12:30",
"end_time": "13:00",
"calendar_stime": "2026-03-12 12:30:00",
"calendar_etime": "2026-03-12 13:00:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 57,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "01:00 PM"
}
]
]
],
[
"13:00",
[
[
{
"start_time": "01:00 PM",
"calendar_stime": "2026-03-12 13:00:00",
"sessions": [
{
"id": 5079275,
"name": "Keynote",
"start_time": "13:00",
"end_time": "14:00",
"calendar_stime": "2026-03-12 13:00:00",
"calendar_etime": "2026-03-12 14:00:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 58,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27637,
"name": "Keynote",
"session_ids": [5079253, 5079275, 5079309, 5079316]
}
]
}
],
"nonparallel": false,
"end_time": "02:00 PM"
}
]
]
],
[
"14:15",
[
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079276,
"name": "Career Fair Open",
"start_time": "14:15",
"end_time": "18:15",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Prince George's Hall E",
"docs": [],
"session_order": 59,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079277,
"name": "Career Growth Hub and Headshots Open",
"start_time": "14:15",
"end_time": "18:15",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "National Harbor 6-8",
"docs": [],
"session_order": 60,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079278,
"name": "CTF (Capture The Flag) Coaching Available",
"start_time": "14:15",
"end_time": "18:15",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "National Harbor 10-11",
"docs": [],
"session_order": 61,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079279,
"name": "WiCyS Store Open",
"start_time": "14:15",
"end_time": "18:15",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "National Harbor 4-5",
"docs": [],
"session_order": 62,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079280,
"name": "Panel: “Hello, My Name Is…”: How to Network and Stand Out",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland A",
"desc": "\u003Cp\u003ENavigating a career fair can feel overwhelming for students and early career professionals eager to make meaningful connections. This interactive panel will demystify the process and equip attendees with actionable strategies to turn introductions into opportunities.\u003C/p\u003E\n\u003Cp\u003EPanelists will share practical tips on how to confidently introduce oneself, engage authentically with recruiters, and ask memorable questions that leave a lasting impression. Attendees also will learn how to network outside the exhibit hall, whether it’s sitting with new people at lunch or striking up conversations at social events. The discussion will extend into the digital space, exploring how to use LinkedIn to strengthen and maintain the relationships built at WiCyS.\u003C/p\u003E\n\u003Cp\u003EThrough short, guided discussions and peer-to-peer practice, participants will walk away with a personalized approach to networking that feels natural, strategic and effective. Whether attending WiCyS for the first time or returning to expand reach, participants will leave this session ready to introduce themselves with confidence and build a network that supports a career long after the conference ends.\u003C/p\u003E",
"docs": [],
"session_order": 63,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Caitlin Sarian",
"pid": 51321111,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/7429714/3cc1544f2c9e66e0f5a11d035d39ee3a.jpeg",
"profile_id": 51321111,
"first_name": "Caitlin",
"last_name": "Sarian",
"aff": "Cybersecurity Girl",
"title": "Founder and Executive Director",
"bio": "Caitlin is the top Cyber influencer with 880k+ followers, and SANS Cyber Community of the Year Winner. She empowers cybersecurity for all by helping them protect their online world & inspire tomorrow's leaders. Over the past 2 years, she's championed diversity in the field, educated on cybersecurity careers, and promoted/simplified cybersecurity topics and online safety. Caitlin previously led TikTok's Global Cyber Advocacy team, leading their cyber awareness both internally & externally and prior, She spent a decade in cyber consulting, starting at EY, focusing on data protection, then moved to the UK for GDPR and Data Privacy and later back to the US to help DLA Piper's cyber and privacy consulting practice. Caitlin continues to be the top cyber educator.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Jenn deBerge",
"pid": 51321115,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/da744cd56edd5af0dc1c92de3b25a0c9.jpeg",
"profile_id": 51321115,
"first_name": "Jenn",
"last_name": "deBerge",
"aff": "Mastercard",
"title": "Fusion Center Director",
"industry": "",
"loc": "Greater St. Louis",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Amber Buening",
"pid": 51321117,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/155618f497b36d9d70c02d4129a847cfedef13f47dbfe6419223ca1cda8c63e4_1/Buening.jpeg",
"profile_id": 51321117,
"first_name": "Amber",
"last_name": "Buening",
"aff": "Huntington Bank",
"title": "SVP, Security Outreach Director",
"bio": "Amber Buening is the Security Outreach Director, SVP at Huntington Bank. In this capacity, her team works alongside Fraud, Risk, Physical Security, and Cybersecurity to protect the bank and its customers by raising awareness of security threats and best practices to protect against these threats.\n\nAmber is also responsible for fostering partnerships with community, industry, and governmental organizations to raise security awareness and collaboration.\n\nBefore joining Huntington, Amber worked for 12 years at The Ohio State University where she served most recently as the Associate Director of Disaster Recovery and Security Outreach. In previous roles at Ohio State, Amber served on the leadership teams of the Information Security (NIST) Framework, Multi-Factor Authentication, and Digital Flagship enterprise projects.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Panelist",
"order": 2
},
{
"name": "Lea-Marie Diedicke",
"pid": 51321119,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/d5d665c4c4292e4c6fd60dd345d8694fa2facd854609291402766f7b7551bc3a_1/Diedicke.jpeg",
"profile_id": 51321119,
"first_name": "Lea-Marie",
"last_name": "Diedicke",
"aff": "Biggest Airline in the World",
"title": "",
"industry": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079281,
"name": "Panel: Building the Cyber Workforce of Tomorrow: Career Growth, Inclusion and the Impact of AI",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EThe cybersecurity workforce is evolving rapidly — shaped by automation, the integration of AI and shifting global economic demands. This panel brings together diverse cybersecurity professionals to explore how individuals can effectively navigate career growth from entry-level to senior technical and leadership roles while staying adaptable in a constantly changing threat landscape.\u003Cbr\u003EPanelists will share actionable strategies for workforce development, upskilling and aligning with future job market needs. Discussion topics include how AI and automation are transforming security roles, how professionals can continuously evolve their skillsets, and what organizations can do to retain and develop talent through mentorship and inclusive culture.\u003Cbr\u003EThe session also explores the human side of cybersecurity — tackling issues like imposter syndrome, building confidence in male-dominated spaces, and the importance of community and representation in shaping tomorrow’s cybersecurity leaders.\u003Cbr\u003EAttendees will leave with insight into emerging workforce trends, practical career navigation tips for every stage of their professional journey, and a renewed perspective on what it means to thrive — technically and personally — in cybersecurity’s next era.\u003C/p\u003E",
"docs": [],
"session_order": 64,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Luna Chen",
"pid": 51321127,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10318046/1c56ddbce599c7e71f918d85211e7a7a.jpeg",
"profile_id": 51321127,
"first_name": "Luna",
"last_name": "Chen",
"aff": "Amazon",
"title": "Software Development Engineer",
"industry": "",
"loc": "Notre Dame, Indiana, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Emily Le",
"pid": 51321129,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10284386/b91908b84b1c14dd948e7bae7b27f0a7.jpeg",
"profile_id": 51321129,
"first_name": "Emily",
"last_name": "Le",
"aff": "Amazon",
"title": "Security Technical Program Manager",
"bio": "I am part of the Amazon’s team focusing on red and purple teaming, pen testing, and security engineering. At Microsoft, I worked in Identity and Access Management (IAM) focused on virtualization, passwordless, and Entra Active Directory Joined.\n\nI believe that learning is a life-long process and always happy to continuously develop my skills in cyber security, offensive security, and technical program management. \n\n “Knowledge weighs nothing—carry all you can.”",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Bruce Robinson",
"pid": 51321131,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/6eb4bfb9f0f5b585c21814754805d13642cc5b52500d48f14342be53ec71513d_1/Robinson.jpeg",
"profile_id": 51321131,
"first_name": "Bruce",
"last_name": "Robinson",
"aff": "Microsoft",
"title": "Sr. Manager Security Incentives and Partnerships",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Panelist",
"order": 2
},
{
"name": "Lynn Miyashita",
"pid": 51321133,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10351953/3e4145faf000ea9598b74758e8ae9a9a.jpeg",
"profile_id": 51321133,
"first_name": "Lynn",
"last_name": "Miyashita",
"aff": "Microsoft",
"title": "Senior Program Manager",
"industry": "",
"loc": "Seattle, Washington, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079282,
"name": "Panel: Governance and Guardrails by Design: Redefining Cybersecurity, Privacy and AI Across Industries",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EAs artificial intelligence (AI) transforms industries, the intersection of cybersecurity, data governance and privacy is emerging as the defining challenge of our time. Traditional compliance models can’t keep pace with autonomous systems, data-driven decisioning and sector-specific threats from ransomware in healthcare to algorithmic bias in financial services.\u003Cbr\u003EThis fireside chat will spotlight how governance and guardrails by design enables organizations to embed cybersecurity, privacy and governance principles into their operations, tools and AI systems from inception. Women leaders driving transformation across critical sectors will share how they operationalize governance strategies that protect and empower, turning compliance into capability and innovation.\u003Cbr\u003EThe discussion will provide perspectives on evolving trends: unpacking why traditional compliance and privacy approaches don’t keep pace with the evolving threat landscape: how governance models can secure data pipelines across sectors: and how organizations can build privacy-driven trust ecosystems that fuel responsible AI adoption and support business innovation.\u003Cbr\u003EParticipants will leave with actionable strategies for aligning technology advancement with cybersecurity, privacy and governance to support innovation and enable growth.\u003C/p\u003E",
"docs": [],
"session_order": 65,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Sara Lazarus",
"pid": 51321142,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/6814218/d302741a186de48d889c2cd8051a4736.jpeg",
"profile_id": 51321142,
"first_name": "Sara",
"last_name": "Lazarus",
"aff": "Faded Jeans Technology LLC",
"title": "",
"loc": "Washington, D.C., Washington, D.C.",
"bio": "Longtime cybersecurity practitioner leading a cyber security services company with GRC and security engineering capabilities.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Laura Sawka",
"pid": 51321145,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9860274/6da4baff3a663ccad6232d8d1364203e.jpeg",
"profile_id": 51321145,
"first_name": "Laura",
"last_name": "Sawka",
"aff": "Sawka Advisory Group, LLC",
"title": "Founder & GRC Executive",
"industry": "",
"loc": "Washington DC-Baltimore Area",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Prabhmeet Kohli",
"pid": 51321146,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10311429/13395e42bbfec4ac63f8a9c1a80a9d50.jpeg",
"profile_id": 51321146,
"first_name": "Prabhmeet",
"last_name": "Kohli",
"aff": "Novamorph",
"title": "Founder & CEO",
"industry": "",
"loc": "Falls Church, Virginia, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079283,
"name": "Panel: Phish and Chips with a Side of AI",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EThis is a lively and interactive panel designed to explore the evolving intersection of cybersecurity threats and artificial intelligence (AI). This discussion will have a special focus on phishing tactics and hardware vulnerabilities. As AI becomes more deeply embedded in both offensive and defensive cyber strategies, understanding its dual role is critical for professionals across the security spectrum. This session will talk about how AI is weaponized to deliver hyper-personalized phishing campaigns and bypass traditional detection systems. Participants will explore how AI can be leveraged to strengthen defenses through anomaly detection, behavioral analysis and predictive threat modeling. The “chips” portion of this session dives into hardware-level risks, including firmware exploits, supply chain attacks and the implications of AI-driven chip design on security. Attendees will gain insight into how emerging chip architectures and AI accelerators are reshaping the threat landscape. Designed for active engagement, the panel will feature a discussion on real phishing attacks and an audience Q&A.\u003C/p\u003E",
"docs": [],
"session_order": 66,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Bianca Arce",
"pid": 51321149,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5238101/cde385ed24e8d20d9bfd4253275376f5.jpeg",
"profile_id": 51321149,
"first_name": "Bianca",
"last_name": "Arce",
"aff": "Veteran",
"title": "",
"industry": "",
"loc": "San Diego",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Tricia McMahon - MSCYB, MSENM",
"pid": 51320142,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5678218/1ebd6be677d7b628e2fe025a4b94187c.jpeg",
"profile_id": 51320142,
"first_name": "Tricia McMahon",
"last_name": "- Mscyb, MSENM",
"loc": "San Diego",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Teenah Eco",
"pid": 51321153,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10290477/933d2a2d7e4b43da5659c5d43972dd79.jpeg",
"profile_id": 51321153,
"first_name": "Teenah",
"last_name": "Eco",
"aff": "2-1-1 San Diego",
"title": "Technology Support Analyst",
"loc": "San Diego, California",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079284,
"name": "Panel: From Imposter to Innovator: Thriving and Leading in the Evolving Cybersecurity Landscape",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EIn a field defined by constant change, many cybersecurity professionals, especially women and underrepresented individuals, struggle with imposter syndrome, feeling they must always prove their worth. At the same time, staying relevant means continuously learning new tools, frameworks and methodologies. This panel will bring together diverse cybersecurity leaders to candidly discuss how to move beyond self-doubt, strategically upskill and lead new programs with confidence.\u003C/p\u003E\n\u003Cp\u003EPanelists will explore how imposter syndrome manifests in technical and leadership roles and share pragmatic strategies for transforming it into a driver of growth (not stagnation). They will share approaches to identify and adopt high-impact skills (for instance, cloud security, AI/ML, identity, DevSecOps) while balancing depth and breadth. The conversation also will dive into real-world lessons from building cybersecurity programs — whether in startups, enterprises, academia or non-profits — including how to gain stakeholder buy-in, align with business goals and scale sustainably.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave not just inspired but also equipped with actionable frameworks and mental models to own their growth trajectory, confidently take on new roles and initiate or expand cybersecurity initiatives in their organizations or communities. This session addresses career development, technical skill alignment, leadership and program building all from the perspective of turning internal doubt into external impact.\u003C/p\u003E",
"docs": [],
"session_order": 67,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Ashley Chirino",
"pid": 51321164,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10298341/67f93d4cc5a2eadc127b5939065b7315.jpeg",
"profile_id": 51321164,
"first_name": "Ashley",
"last_name": "Chirino",
"aff": "Bellevue University",
"title": "Undergraduate Student",
"industry": "",
"loc": "Omaha, Nebraska, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Erika Mancia",
"pid": 51321162,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/4659be2f69386f768d5c32668d0e3d36.jpeg",
"profile_id": 51321162,
"first_name": "Erika",
"last_name": "Mancia",
"aff": "University of the Cumberlands",
"title": "",
"industry": "",
"loc": "Rhinecliff, New York, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Amanda Camilotti",
"pid": 50917449,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202506/7aebc0a04e37af3a22c090e1f89be92151c8ae78708ee45172d49aa96ebf3cec_1/Camilotti.jpeg",
"profile_id": 50917449,
"first_name": "Amanda",
"last_name": "Camilotti",
"aff": "University of Denver",
"title": "",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Panelist",
"order": 2
},
{
"name": "Jennifer Baca",
"pid": 51321161,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10300685/c78d7dbfaae1279699db7ce1a6cf0807.jpeg",
"profile_id": 51321161,
"first_name": "Jennifer",
"last_name": "Baca",
"aff": "Regis University",
"title": "Graduate Student",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Panelist",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079285,
"name": "Panel: Decrypting Tomorrow: How We Build Trust in a Post-Quantum World",
"start_time": "14:15",
"end_time": "15:00",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:00:00",
"place": "Maryland 4-6",
"desc": "\u003Cp\u003EQuantum computing is reshaping the future of cryptography and with it, the foundations of cybersecurity. As quantum capabilities advance, traditional public, key algorithms face obsolescence, forcing organizations to confront the urgent need for quantum-resilient systems. This panel brings together quantum security leaders at the intersection of applied cryptography and real-world security strategy. Together, they will explore the technical, operational and policy dimensions of transitioning to post-quantum cryptography (PQC). Discussion topics include the practical challenges of PQC migration, organizational readiness, NIST standardization progress and the broader implications of quantum vulnerabilities. The panel also will highlight pathways for security practitioners, especially women in cybersecurity, to shape the next era of resilient cryptographic infrastructure. Participants will leave with a clear understanding of what quantum readiness means in practice and how to take actionable steps toward securing systems for the post-quantum age.\u003C/p\u003E",
"docs": [],
"session_order": 68,
"session_feedback_enable": true,
"speaker": {
"Moderator": [
{
"name": "Alana Scott",
"pid": 51321166,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10349396/8e3529f4644f416d716946cd31afa70c.jpeg",
"profile_id": 51321166,
"first_name": "Alana",
"last_name": "Scott",
"aff": "Ericsson",
"title": "Director, Security Frameworks",
"industry": "",
"loc": "Washington, D.C., Washington, D.C.",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Moderator",
"order": 0
}
],
"Panelist": [
{
"name": "Taylor Hartley",
"pid": 51321167,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10318339/d90c4e76d8463e808e6ec2eca6df9d06.jpeg",
"profile_id": 51321167,
"first_name": "Taylor",
"last_name": "Hartley",
"aff": "Terra Quantum",
"title": "Head of Security Solutions",
"industry": "",
"loc": "Denver, Colorado, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 1
},
{
"name": "Emily Fane",
"pid": 51321168,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10339723/22d31c78ff0f2a72fbc9f7805988e795.jpeg",
"profile_id": 51321168,
"first_name": "Emily",
"last_name": "Fane",
"aff": "Point Wild",
"title": "Manager of Cryptography Product Strategy",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Panelist",
"order": 2
},
{
"name": "Richu Channakeshava",
"pid": 51321169,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/951054bceffd7b7981e94d4f997c40568c03377242094d7256d479403416809f_1/Channakeshava.png",
"profile_id": 51321169,
"first_name": "Richu",
"last_name": "Channakeshava",
"aff": "Palo Alto Networks",
"title": "Principal Product Manager",
"industry": "",
"loc": "San Francisco, California, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Panelist",
"order": 3
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "03:00 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5079286,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "14:15",
"end_time": "15:15",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 15:15:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 69,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "03:15 PM"
}
],
[],
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-12 14:15:00",
"sessions": [
{
"id": 5163800,
"name": "SeeHerAsTechnical",
"start_time": "14:15",
"end_time": "16:45",
"calendar_stime": "2026-03-12 14:15:00",
"calendar_etime": "2026-03-12 16:45:00",
"place": "Chesapeake E-F",
"desc": "\u003Cp\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif;\"\u003EThis session is new for WiCyS 2026. It is a high-impact, interactive session designed to bridge the gap between theoretical knowledge and industry reality by replacing the traditional lecture format with direct, unscripted access to seasoned industry professionals. This session is set up as a collaborative hub for everyone from students and career switchers looking to learn how to break into the field to junior analysts. Attendees can expect a rotating environment where they can dive into technical methodologies, discuss current threat landscapes and receive career pathway advice from experts in the field. Whether seeking to break into the field or dive deeper into a technical niche, this is an opportunity to engage with senior technical professionals and gain the technical intelligence to navigate the current cybersecurity landscape. \u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003ESpecific topics Include t\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Ehreat Intelligence; p\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eroduct and engineering; o\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eperations and threat intelligence; d\u003C/span\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003Eata science, AI and machine learning engineering. \u003C/span\u003E\u003Cstrong\u003E\u003Cspan style=\"font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; color: rgb(38, 40, 42); font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; letter-spacing: -0.02em;\"\u003EThis will be an open format, standing room only, walk around environment.\u003C/span\u003E\u003C/strong\u003E\u003C/p\u003E",
"docs": [
{
"title": "SeeHerAsTechnical",
"url": "https://dk2avac86djtt.cloudfront.net/gd_scan/1c541ba4-b158-4587-8ab2-79f02c82c55a/see_her_as_technical.pdf",
"file_id": "1c541ba4-b158-4587-8ab2-79f02c82c55a",
"description": "",
"size": 4571068,
"from_speaker": "",
"time": "March 11, 2026 at 06:12am",
"type": "pdf",
"user": 1590142
}
],
"session_order": 70,
"session_feedback_enable": true,
"speaker": {
"Speaker": [
{
"name": "Jackie McGuire",
"pid": 51513267,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/f8c2f3f3d389a06bd91f2c56112e0b54.jpeg",
"profile_id": 51513267,
"first_name": "Jackie",
"last_name": "McGuire",
"aff": "jackiesinsecurity",
"title": "Jackie",
"industry": "",
"loc": "Tucson, Arizona, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Speaker",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "04:45 PM"
}
]
]
],
[
"15:00",
[
[
{
"start_time": "03:00 PM",
"calendar_stime": "2026-03-12 15:00:00",
"sessions": [
{
"id": 5079287,
"name": "Break in Career Fair",
"start_time": "15:00",
"end_time": "15:30",
"calendar_stime": "2026-03-12 15:00:00",
"calendar_etime": "2026-03-12 15:30:00",
"docs": [],
"session_order": 70,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27638,
"name": "Break",
"session_ids": [5079254, 5079287, 5079317]
}
]
}
],
"nonparallel": false,
"end_time": "03:30 PM"
}
],
[],
[
{
"start_time": "03:00 PM",
"calendar_stime": "2026-03-12 15:00:00",
"sessions": [
{
"id": 5218925,
"name": "Faculty Conversations",
"start_time": "15:00",
"end_time": "15:30",
"calendar_stime": "2026-03-12 15:00:00",
"calendar_etime": "2026-03-12 15:30:00",
"place": "Chesapeake ABC",
"desc": "\u003Cp\u003EJoin this session for a roundtable discussion about grant opportunities in cybersecurity.\u003C/p\u003E",
"docs": [],
"session_order": 71,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "03:30 PM"
}
]
]
],
[
"15:30",
[
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079288,
"name": "Presentation: Reverse Engineering CTF with Ghidra for DNS Exfiltration",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 16:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003EThis session brings together two presenters from different backgrounds and skillsets who will share their unique approaches to reverse engineering with Ghidra, supported by AI assistants. The challenge centers on a capture‑the‑flag (CTF) mission involving DNS exfiltration that includes reverse engineering an unknown protocol embedded in an old server binary; developing a client that communicates correctly with the protocol; transmitting a file through a covert DNS channel to a hosted server; and extracting the hidden flag from the server’s response.\u003C/p\u003E\n\u003Cp\u003EThrough this journey, the presenters will demonstrate that reverse engineering is not reserved for experts – it is achievable by anyone with curiosity and persistence. Along the way, they will highlight practical workflows in Ghidra, show how AI can accelerate analysis and share lessons learned from both successes and setbacks.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with an understanding of DNS exfiltration, concrete steps and tools for approaching reverse engineering challenges in Ghidra, and insights into how AI can augment the problem-solving. The talk also will highlight the importance of stronger encryption and privacy protections across binaries and intellectual property, as the same techniques used for CTF can mimic real‑world security risks.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Yin Ling (Venus) Liong",
"pid": 51321173,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/29538011bc7ff7b1928209fd5e1327b07878951c8f0b68f3a128a4f4cc7e668e_1/Liong.jpeg",
"profile_id": 51321173,
"first_name": "Yin Ling (Venus)",
"last_name": "Liong",
"aff": "Abbott Laboratories",
"title": "Senior Cybersecurity Consultant",
"industry": "",
"loc": "San Diego, California",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Michelle Duell",
"pid": 51321174,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/0d59577e5104092b96eeb306a4497e0efee07b0f1bb9118448107e40df9e9397_1/Duell.png",
"profile_id": 51321174,
"first_name": "Michelle",
"last_name": "Duell",
"aff": "United States Army",
"title": "Geospatial Intelligence Analyst",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079289,
"name": "Presentation: Smarter SOCs, Faster Response: SOAR'ing Against Emerging Cyberthreats",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 16:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003ESecurity operation centers (SOCs) across organizations are overwhelmed with a high volume of security alerts generated by millions of cyberattacks. To remain effective, SOCs must evolve beyond manual triage and static playbooks. This talk explores how integrating artificial intelligence (AI) with security orchestration, automation and response (SOAR) platforms can redefine incident response workflows and empower analysts to make faster, more informed decisions. The presentation will showcase a malware triage playbook and demonstrate how automation can streamline detection, investigation and containment processes. By embedding AI into SOAR, organizations can intelligently automate repetitive tasks, enrich alerts with contextual data and surface actionable insights in real time. This fusion enables analysts to focus on strategic threat mitigation rather than operational overhead.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with a clear rationale for adopting AI-driven SOAR solutions, practical steps for implementation, and a vision for how these technologies can reduce alert fatigue, improve response times and protect organizational reputation in an increasingly hostile digital landscape.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Akua Amos-Abanyie",
"pid": 51321182,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10290923/71921953f6b2085dd6812043ef524d9c.jpeg",
"profile_id": 51321182,
"first_name": "Akua",
"last_name": "Amos-Abanyie",
"aff": "Vanguard",
"title": "Manager, Security Automation Engineering",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Nadia Kropinski",
"pid": 51321184,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10295009/9eefb29778fd917973d9f80aead36df3.jpeg",
"profile_id": 51321184,
"first_name": "Nadia",
"last_name": "Kropinski",
"aff": "The Vanguard Group",
"title": "Senior Manager - Incident Response",
"industry": "",
"loc": "Devon, Pennsylvania, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079262,
"name": "Presentation: Breaking the Invisible Barrier: Advancing Underrepresented Groups in Cyber Leadership",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 16:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EIn this session, participants will examine why underrepresented professionals – those whose intersecting identities across gender, race, education, geography and lived experiences compound barriers to access and advancement – often experience slower promotion cycles and face real roadblocks to leadership. A brief storytelling segment sets the stage, revealing how misaligned feedback loops, “culture fit” expectations and limited sponsorship can create invisible barriers to advancement. Attendees will then break into sector-based collaboration groups to engage in a barrier map exercise, identifying friction points such as gatekeeping, visibility, confidence, opportunity and network. Groups will exchange strategies for overcoming these obstacles through approaches like conversational intelligence, mentorship and advocacy. The exercise culminates with each participant designing one actionable step to remove a barrier, whether requesting a rotation, finding a sponsor or championing more comprehensive review criteria. It concludes with a one-sentence equity pledge for the WiCyS EAC action archive, reinforcing shared accountability and inspiring future policy innovation and sustainable change.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079291,
"name": "Presentation: The Importance of Red Teaming for AI-Powered Applications",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 16:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EOrganizations are rapidly developing applications and chatbots powered by large language models (LLM) and releasing new features into production. This progress brings increased exposure to OWASP‑web LLM attacks alongside the OWASP Top 10 and OWASP API risks that exploit a model’s access to data, APIs or user information beyond an attacker’s direct reach. While traditional security practices such as SAST, SCA and DAST have long protected software systems, generative AI technologies introduce a new threat landscape. LLM pose unique risks, including prompt injection, data leakage, compliance violations, adversarial manipulation and ethical challenges that conventional tools cannot fully address.\u003Cbr\u003EThis session explores how red teaming can meet these emerging challenges by simulating adversarial scenarios, probing vulnerabilities and stress‑testing AI systems under realistic and extreme conditions. Attendees will learn how to design and integrate AI‑focused red team exercises into the development lifecycle, uncover failure modes and apply proactive measures to secure LLM‑enabled applications. The outcome: practical strategies to safeguard user trust, meet regulatory expectations and responsibly develop applications and deploy generative AI at scale.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Godhuli Thapaliya",
"pid": 51321191,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10340870/d7c0d187879f3a26cd07c117c993d2d3.jpeg",
"profile_id": 51321191,
"first_name": "Godhuli",
"last_name": "Thapaliya",
"aff": "Visa",
"title": "Cybersecurity Engineer",
"industry": "",
"loc": "San Francisco Bay Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079292,
"name": "Presentation: Expert or Executive? Navigating Your Cybersecurity Career",
"start_time": "15:30",
"end_time": "16:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 16:15:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EChoosing between a subject matter expert or leadership career path is a defining moment for many women in cybersecurity. This presentation creates a safe, inclusive space to explore both options, drawing from the collective experiences of professionals who have navigated these crossroads. Through presentation, interactive discussion and practical exercises, attendees will gain insights into the skills, challenges and rewards of technical and leadership tracks. Whether contemplating a first move, considering a career pivot or mentoring others, this session will help attendees clarify their goals and build confidence in their decisions. No prior advanced technical experience required, just a willingness to engage and learn from others’ journeys. Join this session to map next steps, connect with peers and leave empowered to own a career path in cybersecurity.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Kristin Lane",
"pid": 51321195,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/c08c4125d03cf5649b18d782fca8cd3363ad608edc7c4b9f4df6e47bd9761ecd_1/Lane.jpeg",
"profile_id": 51321195,
"first_name": "Kristin",
"last_name": "Lane",
"aff": "NTT DATA, INC.",
"title": "Sr. Security Architect",
"loc": "Chicago, Illinois",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Chris Lemmon",
"pid": 50917469,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/4260980/388ffd11c88ded5a603f657f6429bbcb.jpeg",
"profile_id": 50917469,
"first_name": "Chris",
"last_name": "Lemmon",
"aff": "Secure Yeti",
"title": "Director of Security Engineering",
"industry": "",
"loc": "Chicago, Illinois",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079293,
"name": "Affiliate MeetUp",
"start_time": "15:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland 4-6",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
],
[],
[
{
"start_time": "03:30 PM",
"calendar_stime": "2026-03-12 15:30:00",
"sessions": [
{
"id": 5079294,
"name": "Student Research Poster Session",
"start_time": "15:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 15:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Potomac Foyer",
"docs": [],
"session_order": 7,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
]
]
],
[
"15:45",
[
[
{
"start_time": "03:45 PM",
"calendar_stime": "2026-03-12 15:45:00",
"sessions": [
{
"id": 5079295,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "15:45",
"end_time": "16:45",
"calendar_stime": "2026-03-12 15:45:00",
"calendar_etime": "2026-03-12 16:45:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 78,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "04:45 PM"
}
]
]
],
[
"16:30",
[
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-12 16:30:00",
"sessions": [
{
"id": 5079296,
"name": "Presentation: Confidentiality, Integrity…and Accessibility for Dummies (Everyone Counts!)",
"start_time": "16:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 16:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003E“Over half of individuals with moderate or more severe disabilities report experiencing cybervictimization – a rate nearly three times that of those without disabilities (51.0 % vs. 17.4 %) (Public Safety Canada, 2025).\" Individuals with disabilities rely on digital systems for communication, healthcare, education, employment and civic participation. However, inaccessible or insecure systems expose them to disproportionate risks. When accessibility is overlooked, organizations weaken the foundational principles of cybersecurity – confidentiality, integrity and availability.\u003Cbr\u003EInaccessible authentication and CAPTCHA systems can lead users to share credentials, undermining confidentiality (ISO/IEC 27001 A.9; NIST AC-2, IA-2).\u003Cbr\u003EPoorly designed assistive or IoT health technologies can compromise integrity by introducing unverified data or unreliable adaptive interfaces (ISO/IEC 27001 A.12; NIST SI-7). Essential systems, such as MFA, healthcare portals or online banking, also can exclude users through inaccessible design.\u003Cbr\u003EAvailability is effectively denied to entire populations (ISO/IEC 27001 A.17; NIST CP-2).\u003Cbr\u003EUsing a global perspective, presenters will explore how international frameworks, including the UN Convention on the Rights of Persons with Disabilities, the European Accessibility Act, EN 301 549 and U.S. laws such as the American with Disabilities Act and Section 508 intersect with cybersecurity practices. Drawing on W3C Accessibility Guidelines Working Group and the U.S. Access Board’s 2024 AI and Disability findings, presenters will show how digital accessibility directly supports ISO and NIST control objectives, enhances resilience and strengthens trust.\u003Cbr\u003EDisability rights are an operational imperative – central to building secure, compliant and equitable digital systems for all.\u003C/p\u003E",
"docs": [],
"session_order": 79,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Tracy Goodhue",
"pid": 51321200,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10284360/f2ad804259d2ecbc62f532ee0283d90f.jpeg",
"profile_id": 51321200,
"first_name": "Tracy",
"last_name": "Goodhue",
"aff": "Democratic National Committee ",
"title": "IT / Cybersecurity Project Manager ",
"loc": "West Palm Beach, Florida",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Cynthia Taylor",
"pid": 51321201,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5739137/f8c4aea7974b3c998065ad5a50320561.jpeg",
"profile_id": 51321201,
"first_name": "Cynthia",
"last_name": "Taylor",
"aff": "WISP",
"title": "Florida Local Group Leader",
"loc": "Orlando, Florida",
"bio": "Known as “The Fairy Godmother of Cybersecurity,” Cynthia is a cybersecurity professional, advocate, and community builder dedicated to expanding access and opportunity within the cybersecurity industry. She is the Founder of the WiCyS Affiliate \"People with Disabilities and Caregivers\", a Women Techmakers Mentorship Committee Member, and a NICE Cybersecurity Career Ambassador.\n\nWith over a decade of IT experience, Cynthia has built a diverse career spanning industry-leading organizations. Her roles include Mobile Support Manager at Electronic Arts, Accessibility Analyst at WhatsApp (Meta), and Vulnerability Management and Application Security at Voya Financial. Her career reflects a commitment to secure and inclusive design, along with expanding pathways into cybersecurity.\n\nShe earned her Master’s degree in Cybersecurity and Information Assurance from Western Governors University, an NSA-designated Center of Excellence, and holds multiple industry certifications, including GIAC Public Cloud Security (GPCS), Google Professional Cloud Architect, CompTIA CySA+, ISC2 SSCP, and ITILv4 Foundation. She is currently pursuing her CISSP and CPACC.\n\nA passionate volunteer and speaker, Cynthia serves as an ISC2 Exam Developer, a Staffer with The Diana Initiative, and an Education Committee member for the Women’s Society of Cyberjutsu.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-12 16:30:00",
"sessions": [
{
"id": 5079297,
"name": "Presentation: Building an Inclusive Cyber Workforce: Lessons from Kansas City",
"start_time": "16:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 16:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EThis session showcases how regional collaboration can transform the cybersecurity talent landscape by connecting K-12 education, higher education and industry through an inclusive, data-driven ecosystem. Drawing on the Kansas City model, the presentation will explore how local partnerships between EnterpriseKC (EKC) and the WiCyS Kansas City Chapter are expanding cybersecurity access and opportunities across the Heartland.\u003Cbr\u003EAttendees will learn how the Heartland Cyber Range, a statewide virtual learning environment for students and teachers, delivers free experiential training and helps bridge the skills gap. The session also will highlight how the EKC Datasphere provides actionable, real-time insights on workforce demand, enterprise growth and regional economic lift.\u003Cbr\u003EExpert presenters will share replicable strategies for cultivating diverse talent pipelines, fostering inclusive community engagement, and using data to guide sustainable workforce development. This session offers practical insights for educators, policymakers and industry leaders seeking to close the cybersecurity skills gap while promoting equity and regional prosperity.\u003C/p\u003E",
"docs": [],
"session_order": 80,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Chuck Gardner",
"pid": 51321204,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8615968/4b5f800d3fda9feb90a52eb8893e42ed.jpeg",
"profile_id": 51321204,
"first_name": "Chuck",
"last_name": "Gardner",
"aff": "EnterpriseKC",
"title": "Director, Heartland Cyber Range",
"industry": "",
"loc": "Kansas City, Missouri",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Lindy Jensen",
"pid": 51321207,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/bf6ed4dbdeedc56bca891d08c54b08ac.jpeg",
"profile_id": 51321207,
"first_name": "Lindy",
"last_name": "Jensen",
"aff": "EnterpriseKC",
"title": "Director of Cluster Operations",
"industry": "",
"loc": "Kansas City, Missouri, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-12 16:30:00",
"sessions": [
{
"id": 5079298,
"name": "Presentation: Beyond the Magic Wall: Casting Spells on AI, Deepfakes and the Dark Web",
"start_time": "16:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 16:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EEmbark on a magical journey that promises to captivate and enlighten as this session delves into the mesmerizing digital realm where AI, deepfakes, cybersecurity and the dark web intertwine in a narrative of enchantment and intrigue. This must-attend presentation reveals how AI embodies both the benevolent wizards and the cunning warlocks of the digital world. First, participants will witness the wizards as they cast technological spells to safeguard and innovate, revolutionizing cybersecurity with transformative solutions. Afterward, the group will confront the warlocks as they unleash digital mischief, crafting deceptive challenges that test everyone's cyber resilience. The presentation will then dive into the fascinating world of deepfakes, where discerning reality becomes a thrilling challenge, and attendees will unravel the ethical and security issues they present. Participants will discover the dark web not as a shadowy underworld but as a realm to be understood, as the presenters shed light on the dark web’s impact on protecting people from cyber threats (AI or not). Don’t miss this chance to transform understanding and unlock the mysteries in a world full of AI, deepfakes and the dark web.\u003C/p\u003E",
"docs": [],
"session_order": 81,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Alyssa Lisiewski",
"pid": 51321209,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/5aeeeeb03ee8f7689932843f29af33ea86e134b521b9d0932055382839e7e77c_1/Lisiewski.jpeg",
"profile_id": 51321209,
"first_name": "Alyssa",
"last_name": "Lisiewski",
"aff": "Ankura",
"title": "Managing Director, Cyber Threat Investigations & Expert Services",
"industry": "",
"loc": "Washington DC-Baltimore Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Laura Nielsen",
"pid": 51321212,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10304905/a82c55b880f78284ef68815e8a57dea4.jpeg",
"profile_id": 51321212,
"first_name": "Laura",
"last_name": "Nielsen",
"aff": "Ankura",
"title": "",
"industry": "",
"loc": "Nashville, Tennessee, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-12 16:30:00",
"sessions": [
{
"id": 5079299,
"name": "Presentation: Getting SaaS-y: Understanding Account Takeovers",
"start_time": "16:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 16:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003ESo much of companies’ critical data is located on software-as-a-service (SaaS) applications, making it a prime target for threat actors. While on-premises and cloud-hosted network infrastructures are still relevant in most organizations, SaaS applications are increasingly integrated into corporate workflows. SaaS apps contain customer data, manage payroll information and allow employees to share sensitive data – all of which are valuable to threat actors.\u003C/p\u003E\n\u003Cp\u003EIn this talk, presenters will cover the motivations, methods and impacts of SaaS account takeovers. Drawing from their combined 18 years of incident response experience, the presenters will discuss several common SaaS applications and why threat actors target them for compromise. This talk will cover how threat actors get into these accounts to begin with, citing some public examples of widespread account takeover campaigns. Finally, they will share ways to protect oneself and organizations from SaaS compromise.\u003C/p\u003E",
"docs": [],
"session_order": 82,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Carly Battaile",
"pid": 51321233,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10329398/446ddc13afbd75af5a4cd4cb283560b9.jpeg",
"profile_id": 51321233,
"first_name": "Carly",
"last_name": "Battaile",
"aff": "LevelBlue",
"title": "Director, DFIR",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Darcie Winkler",
"pid": 51321234,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5747973/17099c75f162c194e27f231f43374dcf.jpeg",
"profile_id": 51321234,
"first_name": "Darcie",
"last_name": "Winkler",
"aff": "LevelBlue",
"title": "Director, DFIR",
"industry": "",
"loc": "New Albany, Ohio",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
],
[],
[
{
"start_time": "04:30 PM",
"calendar_stime": "2026-03-12 16:30:00",
"sessions": [
{
"id": 5079300,
"name": "Presentation: Winning the Job Search: Recruiter + Hiring Manager Perspectives on AI and Success",
"start_time": "16:30",
"end_time": "17:15",
"calendar_stime": "2026-03-12 16:30:00",
"calendar_etime": "2026-03-12 17:15:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003ENavigating the modern job market can feel like a game of chance, with many qualified candidates filtered out before a recruiter ever sees their name. In this session, led by an experienced hiring manager and recruiter, they will demystify the AI-powered tools that shape today’s hiring process. Attendees will gain an insider’s look at how applicant tracking systems (ATS) and other AI tools really work, from keyword scanning to candidate ranking.\u003C/p\u003E\n\u003Cp\u003EParticipants will receive a practical, actionable AI playbook as a career co-pilot. Presenters will go beyond basic tips to show how to strategically leverage AI to craft resumes that pass the ATS, prepare for interviews, negotiate compensation and position oneself for performance conversations. This session is not about competing with AI, it’s about partnering with it to ensure one's skills and experience shine, helping land a dream role in cybersecurity.\u003C/p\u003E\n\u003Cp\u003EKey learning objectives include understanding the AI hiring ecosystem by gaining insight into how recruiters and hiring managers use AI to screen, source and select candidates; master ATS optimization by learning techniques to craft resumes and profiles that bypass ATS filters and achieve top scores; leverage AI for career advancement by discovering how to use AI tools to enhance personal branding, interview prep with the STAR method and advocate for one's worth; and balance tech and humanity by exploring the importance of authenticity and human connection, using AI to strengthen, not replace, one's personal brand.\u003C/p\u003E",
"docs": [],
"session_order": 83,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Angela Gorospe",
"pid": 50917453,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202506/a230dab94b702eb9e1fc66f21a71b180925a0702cf7241b4054798c18edaa1ac_1/Screenshot_2025_03_12_at_1.12.38_PM.jpeg",
"profile_id": 50917453,
"first_name": "Angela",
"last_name": "Gorospe",
"aff": "Palo Alto Networks",
"title": "Principal Technical Recruiter",
"industry": "",
"loc": "United States",
"bio": "Angela Gorospe is a seasoned talent acquisition leader with over 17 years of global technical recruiting experience. She has successfully built high-performing teams for both agencies and in-house organizations at top companies, including Facebook, Netflix, Google, and now Palo Alto Networks. \n\nBeyond her career in tech, Angela is the proud owner of Hula Truck, a Bay Area-based food truck business specializing in vibrant Filipino & Hawaiian fusion cuisine. Her team caters at major events, including those hosted by SAP and Levi’s, delighting fans of the Sharks and 49ers sports with bold flavors and creative dishes.\n\nDeeply proud of her Mexican and Native American heritage, Angela is committed to increasing representation in the tech industry and has been an active leader in the Juntos Employee Network Group at Palo Alto Netwokrs for four years. She continues to advocate for diversity, inclusion, and career growth opportunities for underrepresented communities in tech.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Marti Mondragon",
"pid": 51321236,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/3531341/745efc944a17c1e57d878a2952c8cb4b.jpeg",
"profile_id": 51321236,
"first_name": "Marti",
"last_name": "Mondragon",
"aff": "Palo Alto Networks",
"title": "Senior Managers, Customer Success Engineering",
"industry": "",
"loc": "Boulder, Colorado",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "05:15 PM"
}
]
]
],
[
"17:30",
[
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5161297,
"name": "Presentation: From Shared Responsibility to Shared Resilience: Evolving Cloud Security for the AI Era",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EThe shared responsibility model was meant to simplify cloud security: providers secure the infrastructure, customers secure their data. Yet in practice, this clear division often collapses under complexity, leaving critical gaps, weak configurations, and sometimes, catastrophic incidents that no one claims ownership for.\u003C/span\u003E\u003Cbr style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EAs the threat landscape evolves and adversaries increasingly weaponize AI, service providers must reimagine what true partnership in security looks like. This talk shares real-world lessons on why the shared responsibility model fails and how we can evolve beyond it. By taking a customer-centric lens, we can transform a best-effort responsibility model into a meaningful partnership, one that builds mutual trust, redefines accountability, and leads with clarity through ambiguity. This evolution means: (1) embedding secure-by-default design, (2) offering tiered solutions aligned to customer capabilities, from autonomous response to customizable detections, and (3) leveraging AI and automation to scale protection and response.\u003C/span\u003E\u003Cbr style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EAttendees will walk away with a deeper understanding of the shared responsibility model—what it is, why it often fails in practice, and how to turn its weaknesses into opportunities for innovation. They’ll learn how to champion a new model of shared accountability that transforms cloud security from a checklist into a true partnership built on trust, transparency, and impact.\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Xiao Zhang",
"pid": 51409481,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/1574952/f2d0b021e7c9a57e97858813bf6a5d0a.jpeg",
"profile_id": 51409481,
"first_name": "Xiao",
"last_name": "Zhang",
"aff": "Salesforce ",
"title": "Principal Data Scientist ",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079302,
"name": "Presentation: Beyond the Breach: Why Your Tabletop Exercise Should Be Your Worst Nightmare",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EThis talk provides a comprehensive overview of tabletop exercises (TTX), highlighting their critical role in cybersecurity preparedness. The importance of TTXs is underscored, highlighting their ability to simulate incident response without real-world consequences. This guide emphasizes the importance of crafting challenging scenarios that push teams beyond their comfort zones, preparing them for worst-case scenarios while maintaining clarity and focus. The ultimate goal is to facilitate continuous improvement and ensure organizational resilience through annual TTX iterations.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Madison Redford",
"pid": 51321245,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10299509/dd47ca74610b3ebfe2b4c8feee5b566f.jpeg",
"profile_id": 51321245,
"first_name": "Madison",
"last_name": "Redford",
"aff": "CAI",
"title": "Sr. Cybersecurity Consultant",
"industry": "",
"loc": "Los Angeles Metropolitan Area",
"bio": "Madison Redford is a Sr. Cybersecurity Consultant with a background in developing robust security frameworks and implementing cutting-edge protective measures. With a strategic approach to IT governance with hands-on technical acumen as a Sr. Consultant, she brings a blend of theoretical knowledge and practical expertise to the forefront of cybersecurity challenges. Her technical prowess extends to evaluating and securing environments, working with critical infrastructure, participating in red, blue, and purple teams, writing, and facilitating Tabletop (TTX) exercises, and creating robust Identity Access Management (IAM) solutions. As she continues to contribute to the field of cybersecurity, she remains committed to expanding her knowledge and skill set, ensuring that she is at the cutting edge of cybersecurity defenses and strategies.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079303,
"name": "Presentation: AI-Driven Cloud Security Assurance",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EAs hybrid- and multi-tenant cloud environments grow in scale and complexity, traditional audit models can no longer keep pace. Static compliance checks and manual reviews fall short when configuration drift, privilege escalation or data exposure can happen in seconds.\u003C/p\u003E\n\u003Cp\u003EThis session explores how artificial intelligence (AI) is transforming cloud security assurance, shifting it from reactive, checklist-based compliance to continuous, predictive trust. Attendees will learn how AI and machine learning automate evidence collection, detect anomalies and align findings with frameworks such as SOC 2 and NIST 800-53.\u003C/p\u003E\n\u003Cp\u003EThrough real-world examples, participants will see how to build explainable, ethical and human-centered AI systems that strengthen audit integrity, enhance visibility and make compliance an always-on capability.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Gaelle Koanda",
"pid": 51321246,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/7395330/e7302da966aba62b4ab02d8aa0a3ca49.jpeg",
"profile_id": 51321246,
"first_name": "Gaelle",
"last_name": "Koanda",
"aff": "BAE Space and Mission Systems",
"title": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "George Nsude",
"pid": 51321247,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/6a84ca31c5a6273f5e7c4e66ced4b12f209cffb2d45df5e2f406b01e67169f11_1/Nsude.jpeg",
"profile_id": 51321247,
"first_name": "George",
"last_name": "Nsude",
"aff": "Ritter Communications",
"title": "Virtualization Architect",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079304,
"name": "Presentation: From Passwords to Passwordless: Orchestrating Global Authentication Change at Scale",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003ERolling out passwordless authentication across a global enterprise is not just a technical migration, it’s a test of coordination, communication and culture.\u003C/p\u003E\n\u003Cp\u003EThis session shares the firsthand experience of leading a global passwordless authentication rollout spanning more than 90 countries and thousands of users, revealing the strategic, human and operational challenges behind the technology.\u003C/p\u003E\n\u003Cp\u003EAttendees will gain an inside look at the orchestration needed to make such a transformation work, aligning IT, security and people operations teams to distribute hardware security keys, manage multi-identity ecosystems and build trust in new authentication flows. Beyond the technical architecture, the talk emphasizes behavioral adoption: using gamification, transparent dashboards and incentive-based nudges to turn compliance into engagement.\u003C/p\u003E\n\u003Cp\u003EThrough real-world lessons and data-driven insights, the session highlights how security engineers can act as change agents, influencing enterprise-wide outcomes without formal authority. Participants will leave with actionable guidance on how to plan, measure and sustain passwordless adoption, turning a complex compliance task into an empowering security movement that reshapes how organizations think about identity and trust.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Abhirami Sasikala Rishikesavan",
"pid": 51321252,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/abdcf3539a06d8a6971d57a02e7d19a1507fbbcf867cf5d840bf5591bb11826a_1/Sasikala_Rishikesavan.jpeg",
"profile_id": 51321252,
"first_name": "Abhirami",
"last_name": "Sasikala Rishikesavan",
"aff": "University of Texas, Austin",
"title": "Graduate Student",
"industry": "",
"loc": "United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079305,
"name": "Presentation: Master the Unadvertised Job Market in Cyberspace",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EIn today’s hypercompetitive cybersecurity market, the best jobs aren’t always posted, they’re discovered, created or earned through visibility and connection. This session dives deep into the unadvertised job market that drives most real-world cybersecurity hiring. Attendees will learn how to find and access hidden opportunities through insider channels from online communities and professional networks to project showcases and personal branding.\u003C/p\u003E\n\u003Cp\u003EThe talk breaks down the modern cybersecurity hiring ecosystem, revealing how recruiters actually source candidates, why traditional applications often fail, and how to make a person's name surface in the right conversations. Through actionable strategies, examples and proven outreach tactics, attendees will gain a clear roadmap to position themselves for unlisted roles, referrals and direct hiring pipelines.\u003C/p\u003E\n\u003Cp\u003EBy the end of this session, participants will know how to strategically build relationships, amplify their professional story and turn visibility into opportunity even in a tough economy. Whether a student, career changer or experienced practitioner, this session will equip everyone to navigate and win in the hidden job market of cyberspace.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Varshitha Gundluru",
"pid": 51321254,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10286551/f8dc8afdffa9b20387de37328a0c7987.jpeg",
"profile_id": 51321254,
"first_name": "Varshitha",
"last_name": "Gundluru",
"aff": "Sectigo",
"title": "Product Solutions",
"loc": "New York City, New York",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079306,
"name": "Lightning Talks",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"place": "Maryland 4-6",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [
[
{
"id": 5125246,
"name": "The Five-Minute Threat Model: Building an AI Threat Modeling Assistant",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EThreat modeling is a cornerstone of product security, yet it is often a manual process that struggles to keep pace with agile development. This friction can lead to it being skipped, leaving products vulnerable. What if engineering teams could be provided with a self-service tool that generates a comprehensive, context-aware baseline of threats in minutes?\u003C/p\u003E\n\u003Cp\u003EThis session demystifies how to build and leverage a custom AI threat modeling assistant. The presenters will show how to move beyond generic prompts by creating a curated, internal knowledge base of an organization's infrastructure, common vulnerabilities and past security review findings. By feeding this anonymized context to a large language model, participants can create a specialized agent that understands a unique risk landscape.\u003C/p\u003E\n\u003Cp\u003EAttendees will learn how to establish a knowledge repository with anonymized architectural patterns and security data; use this repository to power a custom AI agent that provides relevant threat intelligence to developers; and implement a workflow where AI provides the initial baseline, allowing human experts to focus on complex, high-impact risks.\u003C/p\u003E\n\u003Cp\u003EThis session is about scaling security expertise. Attendees will leave with a strategic blueprint for transforming threat modeling from a bottleneck into a rapid, collaborative and intelligent process.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321259,
"name": "Kananda Verma",
"first_name": "Kananda",
"last_name": "Verma",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125247,
"name": "The PhD Dilemma: Prestige, Cost and Payoff in Today’s Age",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EThe decision to pursue a PhD in cybersecurity or computer science is often framed as the pinnacle of academic achievement, but the realities of doctoral study are rarely openly discussed. While a PhD can lead to opportunities in research, academia and thought leadership, it also requires navigating challenges that are not always obvious at the start.\u003Cbr\u003EThis session will take a candid look at the PhD experience and highlight what aspiring doctoral students should be prepared for before committing. Drawing from personal experience of the presenter, it will touch on the dependence on research funding and how it shapes the direction of work, the intense focus required to stay motivated through years of study and the growing role of artificial intelligence in research, raising questions about how doctoral training might evolve. The talk also will contrast the relative benefits of a master’s degree, which often provides faster and more flexible returns.\u003Cbr\u003EAttendees considering doctoral study will leave with an honest perspective on what to expect, what challenges to prepare for and how to decide if this path aligns with their long-term goals.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321260,
"name": "Prajna Bhandary",
"first_name": "Prajna",
"last_name": "Bhandary",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125249,
"name": "Sustainability in AI: How We Can Use AI Without Draining the Planet",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EAI has become increasingly integrated into our workflow especially with employers urging users to adapt it. The speed of this integration has resulted in massive growth in data centers driving energy consumption and clean water usage to keep them running. While discussions involving ethical AI usage center on privacy, security and bias, the environmental impact of AI usage remains overlooked. This session explores principles on how users can tailor their AI use with climate sustainability in mind.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321262,
"name": "Kuleni Shewakena",
"first_name": "Kuleni",
"last_name": "Shewakena",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125250,
"name": "The Power of the WiCyS Community Engagement",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003ECommunity engagement is the foundation of WiCyS’s success as a nonprofit organization. This session reveals how affiliate networks, student chapters and strategic outreach events create lasting impact and amplify the group's mission to advance women in cybersecurity.\u003Cbr\u003EDiscover how WiCyS Affiliate and Student Chapters extend the mission’s reach beyond geographic limitations, creating localized hubs of action and advocacy. Gain insights into how its community collaborators and outreach events build the WiCyS community through working with like-minded organizations to strengthen the mission and expanded reach. This session will discuss what makes the WiCyS community truly strong –  the shared values and mutual investment that turn members into advocates and individual efforts into collective impact.\u003Cbr\u003ELearn how WiCyS is leveraging its community to build a strong, long-lasting cybersecurity workforce and how anyone can help it grow.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321264,
"name": "Cameron Mitchell",
"first_name": "Cameron",
"last_name": "Mitchell",
"label": "Presenter",
"order": 0
},
{
"pid": 51513533,
"name": "Danielle Strimbu",
"first_name": "Danielle",
"last_name": "Strimbu",
"label": "Speaker",
"order": 1
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125251,
"name": "Engineering Python-Based Detection Rules to Stop AI-Enabled Attacks and Prompt Injections",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EAs enterprises rush to adopt ChatGPT and Copilot, security teams need practical ways to detect AI-enabled attacks and prompt injection attempts. This session presents detection engineering strategies developed while building guardrails for enterprise LLM deployments accessible to anyone with basic security monitoring experience.\u003Cbr\u003EThe presenter will demonstrate Python-based detection rules that identify malicious patterns in AI tool usage, including prompt injection attempts designed to bypass safety controls, encoded commands hiding in seemingly innocent requests and data exfiltration through clever prompt manipulation. While attendees see the Python code, the detection concepts apply regardless of one's programming background – it's about understanding attacker patterns not syntax.\u003Cbr\u003EThe session distinguishes between creative legitimate use and actual threats. Participants will learn how behavioral baselines for AI usage work, how to create detection logic that catches novel attack patterns without drowning in false positives as well as integration approaches for common SIEM platforms. The presenter will share specific patterns that have proven effective along with spectacular failures and lessons learned.\u003Cbr\u003EAttendees will leave with detection rule templates, practical approaches for evolving detection capabilities and a framework for measuring AI security posture. Whether a SOC analyst writing a first rule or a senior engineer building detection programs, participants will gain concrete techniques to better secure AI tools in any environment. Basic familiarity with security monitoring concepts are helpful but not required.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321266,
"name": "Santoshi Karuturi",
"first_name": "Santoshi",
"last_name": "Karuturi",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125252,
"name": "Building Inclusion From the Inside Out",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EOver the past two years, the presenter had the privilege of being part of a new, employee-led Inclusion organization within their company — an initiative built by colleagues who shared a common goal to make the workplace more welcoming, equitable and connected. Through countless events, from internal workshops to outreach with local colleges, the presenter saw firsthand the challenges and the profound rewards of this work.\u003C/p\u003E\n\u003Cp\u003EIn this talk, they will share what it’s really like to build inclusion from the inside out with no prior experience and a full-time job as a cybersecurity professional, including but not limited to the lessons learned navigating complex systems, the power of having (and being) a champion for change and the incredible ripple effects that come from even the smallest moments of connection. Whether it’s a 10-minute conversation with a student or the spark of an idea in a team meeting, every act of inclusion matters; and everyone has the power to create them.\u003C/p\u003E",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321269,
"name": "Tiffany Xiao",
"first_name": "Tiffany",
"last_name": "Xiao",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
},
{
"id": 5125254,
"name": "Confessions to a Chatbot: The AI Oversharing Epidemic",
"start_time": "17:30",
"end_time": "18:15",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:15:00",
"desc": "\u003Cp\u003EEveryone has done it – told a chatbot a little too much, maybe asked AI to fix a breakup text, rewrite a work email, roast a dating profile or help word that “totally chill” message to a manager. Congratulations, everyone is part of the AI oversharing epidemic.\u003C/p\u003E\n\u003Cp\u003EIn this session, attendees will explore how people accidentally leak private data while using everyday AI tools like ChatGPT, Copilot and Gemini, and how to stop doing it. Behind every friendly assistant is a system that logs, stores and sometimes trains on what people type. That means a vent session could end up as training data for the next version of the internet’s collective brain. \u003C/p\u003E\n\u003Cp\u003EThrough quick stories and laughs, this session drops the Seven Rules of AI Friendship; a guide to using AI safely: Don’t trauma-dump on the robot; think before pasting; blur the humans; never mix vibes (work ≠ personal); read the fine print; delete the receipts; and the elevator test – if one wouldn’t shout it in a crowded elevator, don’t feed it to AI.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave laughing, slightly paranoid and a lot more AI-safe while chatting with their favorite bots.\u003C/p\u003E",
"docs": [],
"session_order": 7,
"session_feedback_enable": true,
"speaker": [
{
"pid": 51321271,
"name": "Anusha Vajha",
"first_name": "Anusha",
"last_name": "Vajha",
"label": "Presenter",
"order": 0
}
],
"session_id": 5079306,
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"tracks": [],
"tags": []
}
]
],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
}
],
"tags": []
}
],
"nonparallel": false,
"end_time": "06:15 PM"
}
],
[],
[
{
"start_time": "05:30 PM",
"calendar_stime": "2026-03-12 17:30:00",
"sessions": [
{
"id": 5079307,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "17:30",
"end_time": "18:30",
"calendar_stime": "2026-03-12 17:30:00",
"calendar_etime": "2026-03-12 18:30:00",
"place": "National Harbor 12-13",
"docs": [],
"session_order": 7,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "06:30 PM"
}
]
]
],
[
"18:30",
[
[
{
"start_time": "06:30 PM",
"calendar_stime": "2026-03-12 18:30:00",
"sessions": [
{
"id": 5079308,
"name": "Dinner and Networking (must be seated by 6:45 pm to eat)",
"start_time": "18:30",
"end_time": "19:15",
"calendar_stime": "2026-03-12 18:30:00",
"calendar_etime": "2026-03-12 19:15:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 91,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "07:15 PM"
}
]
]
],
[
"19:15",
[
[
{
"start_time": "07:15 PM",
"calendar_stime": "2026-03-12 19:15:00",
"sessions": [
{
"id": 5079309,
"name": "Keynote",
"start_time": "19:15",
"end_time": "20:15",
"calendar_stime": "2026-03-12 19:15:00",
"calendar_etime": "2026-03-12 20:15:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 92,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27637,
"name": "Keynote",
"session_ids": [5079253, 5079275, 5079309, 5079316]
}
]
}
],
"nonparallel": false,
"end_time": "08:15 PM"
}
]
]
],
[
"20:15",
[
[
{
"start_time": "08:15 PM",
"calendar_stime": "2026-03-12 20:15:00",
"sessions": [
{
"id": 5079310,
"name": "Group Photo & WiCyS Dance Party",
"start_time": "20:15",
"end_time": "21:30",
"calendar_stime": "2026-03-12 20:15:00",
"calendar_etime": "2026-03-12 21:30:00",
"place": "Prince George's Hall A",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:30 PM"
}
]
]
],
[
"20:45",
[
[
{
"start_time": "08:45 PM",
"calendar_stime": "2026-03-12 20:45:00",
"sessions": [
{
"id": 5079311,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "20:45",
"end_time": "21:45",
"calendar_stime": "2026-03-12 20:45:00",
"calendar_etime": "2026-03-12 21:45:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 94,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "09:45 PM"
}
],
[],
[
{
"start_time": "08:45 PM",
"calendar_stime": "2026-03-12 20:45:00",
"sessions": [
{
"id": 5079312,
"name": "CTF After Dark Party",
"start_time": "20:45",
"end_time": "22:00",
"calendar_stime": "2026-03-12 20:45:00",
"calendar_etime": "2026-03-12 22:00:00",
"place": "National Harbor 10-11",
"docs": [],
"session_order": 95,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "10:00 PM"
}
]
]
]
],
"type": "Session",
"formatted_date": "Thursday, March 12, 2026"
},
{
"date": "Mar 13, 2026",
"day": "Fri",
"time_ranges": [
[
"07:30",
[
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-13 07:30:00",
"sessions": [
{
"id": 5079313,
"name": "Badge PickUp",
"start_time": "07:30",
"end_time": "09:30",
"calendar_stime": "2026-03-13 07:30:00",
"calendar_etime": "2026-03-13 09:30:00",
"place": "Convention Center Pre-Function",
"docs": [],
"session_order": 96,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:30 AM"
}
],
[],
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-13 07:30:00",
"sessions": [
{
"id": 5151170,
"name": "Information Desk Open",
"start_time": "07:30",
"end_time": "16:30",
"calendar_stime": "2026-03-13 07:30:00",
"calendar_etime": "2026-03-13 16:30:00",
"place": "Chesapeake 2",
"docs": [],
"session_order": 97,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "04:30 PM"
}
],
[],
[
{
"start_time": "07:30 AM",
"calendar_stime": "2026-03-13 07:30:00",
"sessions": [
{
"id": 5151181,
"name": "Quiet/Reflection Room",
"start_time": "07:30",
"end_time": "16:30",
"calendar_stime": "2026-03-13 07:30:00",
"calendar_etime": "2026-03-13 16:30:00",
"place": "National Harbor 1",
"docs": [],
"session_order": 98,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "04:30 PM"
}
]
]
],
[
"08:00",
[
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-13 08:00:00",
"sessions": [
{
"id": 5143727,
"name": "Luggage Storage",
"start_time": "08:00",
"end_time": "17:00",
"calendar_stime": "2026-03-13 08:00:00",
"calendar_etime": "2026-03-13 17:00:00",
"place": "Prince George's Hall A Foyer",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "05:00 PM"
}
],
[],
[
{
"start_time": "08:00 AM",
"calendar_stime": "2026-03-13 08:00:00",
"sessions": [
{
"id": 5079314,
"name": "INVITE ONLY: Pre Keynote Military Breakfast Panel Sponsored by Bloomberg (must arrive by 8:05am to eat)",
"start_time": "08:00",
"end_time": "09:00",
"calendar_stime": "2026-03-13 08:00:00",
"calendar_etime": "2026-03-13 09:00:00",
"place": "National Harbor 2-3",
"desc": "\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EStart the day with an interactive “Ask Me Anything” pre-keynote breakfast panel designed for military cybersecurity professionals. This session offers a welcoming space to hear from experienced industry leaders and gain practical insights into building a successful career in cybersecurity.\u003C/span\u003E\u003C/p\u003E\n\u003Cp dir=\"ltr\" style=\"line-height: 1.38; margin-top: 12pt; margin-bottom: 12pt;\"\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThrough guided discussion and networking, you’ll explore career paths and gain real-world perspectives from industry professionals at Bloomberg while enjoying breakfast. Whether you’re seeking advice or connections with fellow military professionals, this session is designed to support your growth and help you navigate the next steps in your cybersecurity journey. \u003C/span\u003E\u003Cspan style=\"font-size: 11pt; font-family: Arial,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"\u003EThe program begins at 8:15am ET.\u003C/span\u003E\u003C/p\u003E\n\u003Cp\u003E \u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
}
]
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
]
]
],
[
"08:15",
[
[
{
"start_time": "08:15 AM",
"calendar_stime": "2026-03-13 08:15:00",
"sessions": [
{
"id": 5079315,
"name": "Breakfast Available for Scholarship Recipients",
"start_time": "08:15",
"end_time": "09:00",
"calendar_stime": "2026-03-13 08:15:00",
"calendar_etime": "2026-03-13 09:00:00",
"place": "Prince George's Hall A",
"docs": [],
"session_order": 98,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "09:00 AM"
}
]
]
],
[
"09:15",
[
[
{
"start_time": "09:15 AM",
"calendar_stime": "2026-03-13 09:15:00",
"sessions": [
{
"id": 5079316,
"name": "Keynote (doors open 9:00 am)",
"start_time": "09:15",
"end_time": "10:15",
"calendar_stime": "2026-03-13 09:15:00",
"calendar_etime": "2026-03-13 10:15:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 99,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27637,
"name": "Keynote",
"session_ids": [5079253, 5079275, 5079309, 5079316]
}
]
}
],
"nonparallel": false,
"end_time": "10:15 AM"
}
]
]
],
[
"10:15",
[
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-13 10:15:00",
"sessions": [
{
"id": 5079317,
"name": "Break Sponsored by Take9",
"start_time": "10:15",
"end_time": "10:45",
"calendar_stime": "2026-03-13 10:15:00",
"calendar_etime": "2026-03-13 10:45:00",
"docs": [],
"session_order": 100,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27638,
"name": "Break",
"session_ids": [5079254, 5079287, 5079317]
}
]
}
],
"nonparallel": false,
"end_time": "10:45 AM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-13 10:15:00",
"sessions": [
{
"id": 5079318,
"name": "Career Fair Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-13 10:15:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Prince George's Hall E",
"docs": [],
"session_order": 101,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-13 10:15:00",
"sessions": [
{
"id": 5079319,
"name": "Career Growth Hub and Headshots Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-13 10:15:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "National Harbor 6-8",
"docs": [],
"session_order": 102,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "10:15 AM",
"calendar_stime": "2026-03-13 10:15:00",
"sessions": [
{
"id": 5079320,
"name": "WiCyS Store Open",
"start_time": "10:15",
"end_time": "12:30",
"calendar_stime": "2026-03-13 10:15:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "National Harbor 4-5",
"docs": [],
"session_order": 103,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"10:30",
[
[
{
"start_time": "10:30 AM",
"calendar_stime": "2026-03-13 10:30:00",
"sessions": [
{
"id": 5079321,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "10:30",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:30:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 104,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
]
]
],
[
"10:45",
[
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079323,
"name": "Presentation: Beyond the Break-In: How to Level-Up from Entry to Junior Level",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "Maryland B",
"desc": "\u003Cp\u003ELanded a first cybersecurity role? Now what? Moving from entry level to junior level isn’t just about earning a new title, it’s about growing one's voice, confidence and impact in the field. The early years in cybersecurity can feel like trying to level up in a game where the rules keep changing. People are learning fast, juggling certifications, decoding job descriptions and trying to prove they belong. This session is where the presenter helps attendees play smarter not harder. \u003C/p\u003E\n\u003Cp\u003EThe presenter will break down what it really means to step into a next-level role: developing technical depth, showing initiative and turning support tasks into strategic wins. Participants will learn how to showcase their achievements, find mentors who lift them up and build the credibility that opens doors to bigger opportunities. With relatable stories, honest lessons learned and practical strategies, this presentation will help attendees transform the “what’s next?” anxiety into a clear, actionable roadmap. Attendees will reflect on skill gaps, personalized goals and walk away with tools to take charge of their career development with confidence and purpose. Because this isn’t just about climbing the ladder, it’s about claiming a space in cybersecurity.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Morgan Hamlin",
"pid": 50917521,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8958988/0749b2474befa4110609249f80fc2a3a.jpeg",
"profile_id": 50917521,
"first_name": "Morgan",
"last_name": "Hamlin",
"aff": "Grand Valley State University",
"title": "Information Security Analyst",
"industry": "",
"loc": "Grand Rapids, Michigan",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079324,
"name": "Presentation: AI in the Exam Room: Powering Healthcare While Protecting Privacy",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EPicture a routine checkup where AI listens as closely as a clinician. From screening and triage to surgical visualization and post-visit planning, AI tools are transforming every stage of patient care. The upside is real: faster workflows, smarter decisions and more meaningful human connection during visits. Yet, as AI listens, learns and predicts, a critical question emerges – what happens to privacy when the most sensitive health data fuels the algorithm?\u003C/p\u003E\n\u003Cp\u003EThis session examines how clinician-facing AI is reshaping workflows and redefining patient trust. Presenters will examine the expanding role of AI in healthcare today, from decision support to documentation, and confront the real-world risks that affect patients and providers – data leakage, model bias, overreliance on AI, hallucinations and weak oversight. \u003C/p\u003E\n\u003Cp\u003EAdditionally, particpants will explore the other side of the equation, highlighting how responsible adoption can unlock tangible benefits in access, accuracy and equity of care. Grounded in real-world experience implementing digital transformations across the healthcare industry, this session also will highlight how providers can embed privacy-by-design, apply Responsible AI principles and use privacy-preserving technologies to enable innovation safely.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with a clear understanding of how healthcare providers are adopting AI and how they can mitigate privacy/security risks. Presenters will focus on the data-protection technologies that can safeguard patients while empowering clinicians. With personal health data people need to ask, what guardrails are being considered?\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Harshini Chellasamy",
"pid": 51321286,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10302580/73795bc6155d7042fac6412fbff8b21c.jpeg",
"profile_id": 51321286,
"first_name": "Harshini",
"last_name": "Chellasamy",
"aff": "Boston Consulting Group",
"title": "Senior Consultant",
"industry": "",
"loc": "Chicago, Illinois, United States",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Julia Kip",
"pid": 51321287,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10345609/9e09beca29b396908a797b22e490618c.jpeg",
"profile_id": 51321287,
"first_name": "Julia",
"last_name": "Kip",
"aff": "Boston Consulting Group",
"title": "IT Consultant, Cybersecurity",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079325,
"name": "Presentation: Cyber Resilience for the Connected Car: Building AI-Powered Intrusion Detection Systems",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EAs vehicles evolve into connected, software-defined systems, their increasing connectivity also expands the attack surface for cyberthreats. Traditional security measures cannot fully protect in-vehicle networks such as the Controller Area Network (CAN) and automotive Ethernet, which were never designed with authentication or encryption. This presentation introduces an AI-powered intrusion detection system framework tailored for embedded automotive environments. The session explores how lightweight neural networks can monitor CAN traffic, identify abnormal communication patterns and operate efficiently within real-time constraints on edge devices. Attendees will gain insight into model design principles, hardware deployment and performance tradeoffs between detection accuracy, latency and energy efficiency. The talk also will highlight case studies using embedded hardware platforms such as Raspberry Pi/Jetson Nano, emphasizing how trustworthy AI can enhance vehicle safety and public trust. Finally, it will discuss emerging research challenges – data drift, secure model updates and regulatory compliance – framing the path toward truly cyber-resilient intelligent vehicles.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Linxi Zhang",
"pid": 51321289,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/c3ff6ce178aaab42582b5c51a71ca5c336a9183421e99cba0f74a391a5e4e990_1/Zhang.jpeg",
"profile_id": 51321289,
"first_name": "Linxi",
"last_name": "Zhang",
"aff": "Central Michigan University",
"title": "Assistant Professor",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079326,
"name": "Presentation: Firewalling Success: Building Strong Mentor–Mentee Relationships in Cybersecurity",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EA strong mentor–mentee relationship can be a powerful tool for learning, growth and professional development. This session explores how mentors and mentees can work together effectively to create a meaningful and productive partnership. Participants will learn about the distinct roles and responsibilities of each person, including how mentors can guide, support and challenge, and how mentees can take ownership, ask questions and actively engage in their own growth.\u003C/p\u003E\n\u003Cp\u003EThe session also will share practical ideas for making the most of the mentor–mentee relationship. Topics include setting clear goals, communicating openly, giving and receiving feedback, and building trust over time. Realistic examples and simple strategies will help participants understand how to handle common challenges such as misaligned expectations, time constraints or communication gaps.\u003C/p\u003E\n\u003Cp\u003EIn addition, the session will focus on expectations – what mentors and mentees should reasonably expect from each other and what falls outside the scope of the relationship. By clarifying expectations early, both parties can avoid misunderstandings and build a respectful, supportive connection.\u003C/p\u003E\n\u003Cp\u003EWhether new to mentoring or looking to strengthen an existing relationship, this session provides clear guidance and actionable tips to help mentors and mentees create partnerships that are rewarding, balanced and focused on long-term success.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Kimberly Thomas",
"pid": 51321291,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/c77930c140fe0b2835e22640934c5badeeb58f4b4ebf1524c2baea8247eed6ff_1/Thomas.jpeg",
"profile_id": 51321291,
"first_name": "Kimberly",
"last_name": "Thomas",
"aff": "Bloomberg",
"title": "Security Awareness and Training Specialist",
"industry": "",
"loc": "New York City Metropolitan Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Betty Lam",
"pid": 51321293,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/4536689/c9dc66b4ca614fc3996b9d6d95a7496e.jpeg",
"profile_id": 51321293,
"first_name": "Betty",
"last_name": "Lam",
"aff": "Bloomberg",
"title": "Director of Public Cloud Engineering",
"industry": "",
"loc": "New York City Metropolitan Area",
"bio": "(she/her) Betty Lam is an Engineering Manager at Bloomberg.\n\nwww.linkedin.com/in/lambetty",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Jenny Sun",
"pid": 51513541,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5760788/8cc503af4dcbd07d3bc5c56fad8f675c.jpeg",
"profile_id": 51513541,
"first_name": "Jenny",
"last_name": "Sun",
"aff": "Bloomberg",
"title": "Engineering Team Lead",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079322,
"name": "Presentation: Spilling the Beans: Graph Neural Networks That Actually Get Java Security",
"start_time": "10:45",
"end_time": "11:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 11:30:00",
"place": "Maryland 4-6",
"desc": "\u003Cp\u003ETraditional static analysis tools rely on pattern matching and rule-based heuristics, resulting in high false positive rates and missed vulnerabilities in complex code flows. This session introduces a novel approach using graph neural networks (GNN) to detect security vulnerabilities by learning from code property graphs that capture program semantics.\u003C/p\u003E\n\u003Cp\u003EThe presenter has a production-ready framework that models Java codebases as heterogeneous graphs containing control flow, data flow and program dependencies. By applying graph attention networks with Bayesian uncertainty quantification, the system achieves 100% detection accuracy on 22+ common weakness enumeration classes while providing confidence scores rather than binary alerts.The framework implements research-grade taint tracking with context-sensitive analysis, field-sensitive pointer analysis and interprocedural data flow tracking. Unlike traditional tools that flag every user input as critical, this approach understands program semantics to distinguish between sanitized and exploitable data flows. Advanced features include implicit flow detection through control dependencies and counterfactual explanations that suggest minimal code changes to eliminate vulnerabilities. Attendees will learn how machine learning can enhance security analysis, understand the technical architecture of GNN-based vulnerability detection and gain practical knowledge for integrating automated analysis into CI/CD pipelines. The session covers real-world case studies, benchmark comparisons with commercial tools and discusses the intersection of program analysis research and practical security engineering.This work bridges academic research (ACM, PLDI, FSE) with industry needs, demonstrating how deep learning can augment human security expertise rather than replace it.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Rhette Wallach",
"pid": 51321301,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10243106/e9e84fdf67455e74bf036590b7979f53.jpeg",
"profile_id": 51321301,
"first_name": "Rhette",
"last_name": "Wallach",
"aff": "Inveniam",
"title": "Distinguished Engineer, Offensive Security",
"loc": "Somerset, New Jersey",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "11:30 AM"
}
],
[],
[
{
"start_time": "10:45 AM",
"calendar_stime": "2026-03-13 10:45:00",
"sessions": [
{
"id": 5079327,
"name": "Student Chapter MeetUp",
"start_time": "10:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 10:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland A",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EJoin this session to learn about starting, running and maintaining \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003Ea student chapter on campus. Current chapter leaders will share \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003Etheir experiences, discuss challenges, and address the issues \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003Ethat commonly arise as a student chapter officer. Bring lots of \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003Equestions with ideas and help each other succeed in promoting \u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003Ewomen in cybersecurity at their campuses.\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"11:45",
[
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-13 11:45:00",
"sessions": [
{
"id": 5079329,
"name": "Presentation: The Anatomy of a Resilient and Unified Log Ingestion Framework",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 11:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EIn modern cybersecurity, raw data is only as powerful as the pipelines that carry it. Many organizations face the same challenge – thousands of applications emitting fragmented, inconsistent telemetry that slows investigations and inflates storage costs. What began as chaos can evolve into a unified, resilient log ingestion framework built on cloud-native tools that transform scattered data into structured, actionable intelligence.\u003C/p\u003E\n\u003Cp\u003EThis talk walks through that journey of transformation, from architectural pain points to a scalable, self-healing pipeline. It explores how a modular poller framework can ingest and normalize dozens of SaaS security sources, with each log type handled by a pluggable module using Pydantic validation and ECS-aligned schema mapping for consistency at scale. The session also covers Terraform-managed access control, checkpointing logic and observability via CloudWatch and CI/CD integration.\u003C/p\u003E\n\u003Cp\u003EAttendees will leave with practical takeaways on designing sustainable, developer-friendly ingestion architectures plus a glimpse into future directions such as AI-driven log optimization that makes security telemetry smarter, leaner and more adaptive.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Asmin Alev Aktas",
"pid": 51321305,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/22db65797d800650bef28ec22f3ea2a818cbf5c977fb8f3fba2ed8649f9894d1_1/Aktas.jpeg",
"profile_id": 51321305,
"first_name": "Asmin Alev",
"last_name": "Aktas",
"aff": "Okta",
"title": "Senior Data Engineer",
"industry": "",
"loc": "Toronto, Ontario",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "Research and Innovation with Emerging Techniques",
"id": 887294,
"color": "#f05323"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-13 11:45:00",
"sessions": [
{
"id": 5079330,
"name": "Presentation: AI, See What You Did There: Leveraging Threat Intelligence During Investigations",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 11:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EAs cyberthreats grow in sophistication, combining threat intelligence with digital forensics and incident response (DFIR) is no longer optional – it’s essential. This talk explores why DFIR and threat intelligence are intertwined, how frameworks like MITRE ATT&CK support investigations, and introduces platforms such as the Malware Information Sharing Platform and OpenCTI. These platforms can be leveraged to support investigations with the option to integrate artificial intelligence (AI) to quickly identify malicious activity. This talk will then dive into real-world examples to illustrate how threat intelligence collaboration both internally and between organizations leads to deeper insights regarding threat actor groups and more effective containment. Attendees will leave with practical strategies for leveraging threat intelligence and AI to strengthen their DFIR workflows, overcome integration challenges and stay ahead of evolving threats.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Victoria Nyktas",
"pid": 51321306,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9010500/766c7d2446564d2ad929e0fc863a5d34.jpeg",
"profile_id": 51321306,
"first_name": "Victoria",
"last_name": "Nyktas",
"aff": "LevelBlue",
"title": "DFIR Consultant",
"loc": "New York City, New York",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Natasha Vij",
"pid": 51321308,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/ae776e1b46ebcec0852a09acd35fc8c4f37149e129641728dcc8fffe603535f0_1/Vij.jpeg",
"profile_id": 51321308,
"first_name": "Natasha",
"last_name": "Vij",
"aff": "LevelBlue",
"title": "DFIR Consultant",
"loc": "New York City Metropolitan Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-13 11:45:00",
"sessions": [
{
"id": 5079331,
"name": "PRESENTATION: GCP CL-WHY: The Hacker's and the Hero's Guide to the CLI",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 11:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland D",
"desc": "\u003Cp\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003EThe \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003EGCP Command Line Interface\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E (\u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003ECLI\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E) is a powerful tool for developers and administrators. Yet, in the hands of threat actors, it transforms into a potent weapon for initial access and data exfiltration. But what can we do to proactively lock down the gateway to our cloud environments? In this talk, we will review what the \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003EGCP\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003ECLI\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E is, the credentials used to access it, how those credentials are stolen and ways attackers can circumvent misconfigured security controls. We will then spend a lot of time going over the layers of defense that can be applied to the \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003EGCP\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003ECLI\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E. Finally we will review detections that will let you know whenever someone is trying to breach your cloud environment through the \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003EGCP\u003C/span\u003E\u003Cspan style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;\"\u003E \u003C/span\u003E\u003Cspan class=\"il\" style=\"color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: small; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003ECLI\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Shannon McHale",
"pid": 51443518,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/2c79c4882501f084050c1f3aad391281.jpg",
"profile_id": 51443518,
"first_name": "Shannon",
"last_name": "McHale",
"aff": "Google",
"title": "Staff Security Engineer (offensive security) ",
"industry": "",
"loc": "Washington DC",
"bio": "Heyo! I’ve been coming to WiCyS since 2018 when I was a freshman at Rochester Institute of Technology (RIT). While at RIT I was President of our 200+ person cybersecurity club (about 6 of which were women). I founded our WiCyS student chapter to get another ticket to the conference and to encourage others to come with me. \n\nNow, I work at Google! I’ve been promoted three times in my almost five years working. I am now a Staff Security Engineer (L6). A lot of the skills that contribute to my success I learned while at WiCyS. I hope to gain more this year!! \n\nAll that to say, if you are a student I’ve been you. If you are an executive, I want to be you!!! Either way, hope we can meet up and talk all things cyber.\n\nPS my organization is delivering AI Security Assessments for public sector customers. Let me know if you are interested!",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-13 11:45:00",
"sessions": [
{
"id": 5079332,
"name": "Presentation: My Journey from International Student to Cybersecurity Professional",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 11:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EToday, as a cybersecurity professional, the presenter looks back on their journey as an international student and multiple affiliations scholar, reflecting on the lessons, challenges and opportunities that shaped their career.vTransitioning into a new country to pursue education and a career in cybersecurity can be both exciting and challenging – especially for international students balancing academics, networking and career aspirations in a competitive environment. This session shares an inspiring and practical journey of overcoming cultural, professional and personal barriers while building a career in cybersecurity as an international student.\u003C/p\u003E\n\u003Cp\u003EAttendees will gain insight into navigating the job market – from building connections, developing relevant skills and approaching recruiters confidently to staying resilient through rejection and uncertainty. The session also will highlight the value of professional communities in helping students expand their network, find mentorship and access career opportunities that would otherwise feel out of reach.\u003C/p\u003E\n\u003Cp\u003EThis presentation aims to empower attendees with actionable strategies for success, including how to build visibility through LinkedIn, leverage career fairs effectively and make the most of every learning opportunity. Whether an aspiring cybersecurity professional, a mentor or part of a hiring team, this session will provide a deeper understanding of the international student experience and how collaboration, community and persistence can lead to career breakthroughs.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Pallavi Savant",
"pid": 51321314,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/dde80ee94e043a2337c609411ea56fe489a2a171b6c547cf6a277dfd8d15ec9a_1/Savant.jpeg",
"profile_id": 51321314,
"first_name": "Pallavi",
"last_name": "Savant",
"aff": "Palo Alto Networks",
"title": "Senior Software Engineer",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Career Development, Advancement and Management",
"id": 887291,
"color": "#b1d34a"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
],
[],
[
{
"start_time": "11:45 AM",
"calendar_stime": "2026-03-13 11:45:00",
"sessions": [
{
"id": 5079328,
"name": "Presentation: Quantum Karaoke: When Post-Quantum Crypto Meets AI Noise",
"start_time": "11:45",
"end_time": "12:30",
"calendar_stime": "2026-03-13 11:45:00",
"calendar_etime": "2026-03-13 12:30:00",
"place": "Maryland 4-6",
"desc": "\u003Cp\u003EWhile the world is still debating artificial intelligence (AI) ethics and hallucinations, the future of quantum computers is quietly warming up their qubits to wreck the internet’s encryption party. Post-quantum cryptography (PQC) is the new playlist for securing data against quantum attacks; but what happens when AI joins the jam session? \u003Cbr\u003EThis presentation explores the discordant musical harmony between PQC and AI, where machine learning optimizes cryptographic performance while adversarial AI tries to remix the keys. The presenters will dive into looming quantum threats, adopting proactive remediation strategies like AI-driven cryptanalysis such that today’s “secure” doesn’t turn into tomorrow’s karaoke disaster.\u003Cbr\u003ELearning outcomes include demystifying the chaotic harmony between PQC and AI; how AI noise plays within quantum karaoke; and earning actionable steps to protect against cybersecurity threats before the qubits start singing.\u003Cbr\u003EThrough the lens of quantum karaoke, this session represents a noisy, unpredictable interplay between PQC and AI, illustrating the dual-edged role AI plays in shaping the future of cryptographic security. It highlights how AI can both amplify threats to new encryption methods and be used to defend against them. The \"singing\" is communication protected by PQC while the karaoke aspect represents the risk that this new encryption could be co-opted or undermined.\u003Cbr\u003EExplore the complex, two-sided issues of AI noise in quantum karaoke where AI can be both a defender and a saboteur in the post-quantum era and learn about the strategies cybersecurity professionals need to adopt to fight against this daunting challenge.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Charul Sharma",
"pid": 51321323,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/f7aa249e601a114a1c502548456d0c38e5a7a56f9a3ffcf00facc9ba48c5d6b8_1/Sharma.jpeg",
"profile_id": 51321323,
"first_name": "Charul",
"last_name": "Sharma",
"aff": "Micron Technology Inc.",
"title": "Principal GRC Program Manager",
"industry": "",
"loc": "Denver, Colorado",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Lisa Raykowski",
"pid": 51321380,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/3668643/8de5f6b7a59cc211ef595a5d8cd6d2cb.jpeg",
"profile_id": 51321380,
"first_name": "Lisa",
"last_name": "Raykowski",
"aff": "EY",
"title": "Cybersecurity Senior Manager",
"loc": "Phoenix, Arizona",
"bio": "Senior Manager in the Cybersecurity practice at EY.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 0,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (1)",
"id": 887295,
"color": "#000000"
}
],
"tags": [
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "12:30 PM"
}
]
]
],
[
"12:30",
[
[
{
"start_time": "12:30 PM",
"calendar_stime": "2026-03-13 12:30:00",
"sessions": [
{
"id": 5079333,
"name": "Lunch & Networking (must be seated by 12:40 pm to eat)",
"start_time": "12:30",
"end_time": "13:00",
"calendar_stime": "2026-03-13 12:30:00",
"calendar_etime": "2026-03-13 13:00:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 116,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "01:00 PM"
}
]
]
],
[
"13:00",
[
[
{
"start_time": "01:00 PM",
"calendar_stime": "2026-03-13 13:00:00",
"sessions": [
{
"id": 5079334,
"name": "Awards Ceremony",
"start_time": "13:00",
"end_time": "14:00",
"calendar_stime": "2026-03-13 13:00:00",
"calendar_etime": "2026-03-13 14:00:00",
"place": "Potomac Ballroom",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "02:00 PM"
}
]
]
],
[
"14:00",
[
[
{
"start_time": "02:00 PM",
"calendar_stime": "2026-03-13 14:00:00",
"sessions": [
{
"id": 5079335,
"name": "Travel Stipend Verification",
"start_time": "14:00",
"end_time": "14:30",
"calendar_stime": "2026-03-13 14:00:00",
"calendar_etime": "2026-03-13 14:30:00",
"place": "Potomac 1-3 Foyer",
"docs": [],
"session_order": 118,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": []
}
],
"nonparallel": false,
"end_time": "02:30 PM"
}
]
]
],
[
"14:15",
[
[
{
"start_time": "02:15 PM",
"calendar_stime": "2026-03-13 14:15:00",
"sessions": [
{
"id": 5079336,
"name": "Escape Room (OnSite SignUp Required)",
"start_time": "14:15",
"end_time": "15:15",
"calendar_stime": "2026-03-13 14:15:00",
"calendar_etime": "2026-03-13 15:15:00",
"place": "National Harbor 12-13",
"desc": "\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Terminal Velocity\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EA routine anomaly has escalated into a full-scale emergency, threatening the nation’s transportation infrastructure. An unknown adversary has breached transportation networks and is positioned to manipulate operational data and override safety systems, accelerating toward a catastrophic outcome. At the center of the attack is a suspicious device embedded within the environment—designed to trigger a cascading failure if left active. If the attack reaches terminal velocity, the consequences will be irreversible.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA has enlisted your team to respond. As cybersecurity and infrastructure specialists, you must investigate compromised operational environments, analyze network activity, and restore critical operations. Each clue uncovered and every puzzle solved brings you closer to unlocking and deactivating the device before time runs out.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to take part in this immersive experience. Terminal Velocity combines traditional escape room puzzles with hands-on cybersecurity and industrial control system challenges drawn from the transportation sector. Participants will engage with puzzles involving Wi-Fi analysis, network scanning, cyber-attack identification, and control systems. With a balance of technical and non-technical puzzles, the room offers engaging challenges for participants of all skill levels. Work as a team, think like an attacker—and a defender—and see if you can stop the adversary before it’s too late.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E———\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003E\u003Cstrong style=\"box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; outline: 0px; text-size-adjust: 100%; vertical-align: baseline; background: transparent; font-weight: bold;\"\u003EICScape – Network Discovery\u003C/strong\u003E\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003EThe space station Asteroid Covenant has sent out a distress signal stating they have experienced a loss of its critical life support control systems. The life support systems (i.e., oxygen and HVAC systems) have failed and there is only 60 minutes of air remaining before the demise of the crew.\u003C/span\u003E\u003C/p\u003E\n\u003Cp style=\"box-sizing: border-box; margin: 0px; padding: 0px 0px 1em; border: 0px; outline: 0px; font-size: 18px; text-size-adjust: 100%; vertical-align: baseline; background: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: 'Open Sans', Helvetica, Arial, Lucida, sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 500; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\"\u003E\u003Cspan style=\"font-size: 12pt;\"\u003ECISA and Idaho National Laboratory invite you to be a part of the adventure. This escape room contains a series of traditional escape room puzzles mixed with cybersecurity elements that utilize passive and active network discovery tools and techniques. Can you find your way onto the systems and figure out how to restore the life support systems before time runs out?\u003C/span\u003E\u003C/p\u003E",
"docs": [],
"session_order": 119,
"session_feedback_enable": true,
"speaker": {
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [],
"tags": [
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
}
]
}
],
"nonparallel": false,
"end_time": "03:15 PM"
}
]
]
],
[
"14:30",
[
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079337,
"name": "Workshop: Understanding and Mitigating Prompt Injection Attacks in Large Language Models",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland A",
"desc": "\u003Cp\u003ELarge language models (LLMs) are increasingly integrated into education, research and real-world applications, but their openness to natural language input also makes them vulnerable to adversarial manipulation. One of the emerging threats is the prompt injection attack, where carefully crafted inputs cause the model to reveal hidden instructions, override safety filters or execute unintended actions. This workshop introduces participants to the mechanics of prompt injection, demonstrates real-world scenarios of how such attacks can occur, and highlights their implications for security, ethics and trust in AI systems. Through guided activities, participants will practice identifying suspicious prompts, experimenting with controlled injections in sandbox settings, and exploring mitigation strategies such as input sanitization, content filtering and model alignment. By the end of the session, attendees will gain conceptual understanding and hands-on skills to critically evaluate and defend against prompt injection attacks in LLM-powered applications.\u003C/p\u003E",
"docs": [],
"session_order": 1,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Jennifer Schieferle Uhlenbrock",
"pid": 50917492,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202506/f2cf3cfe57957518c2a8438957113601b975426fd6a0957b6a869fecf49c1d59_1/UHL.jpeg",
"profile_id": 50917492,
"first_name": "Jennifer",
"last_name": "Schieferle Uhlenbrock",
"aff": "Provisio Insights",
"title": "Cybersecurity Consultant",
"industry": "",
"loc": "Austin",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Deepti Gupta",
"pid": 51690243,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/ems/upload/img/ln/2bd798a86570c3766f09d08983f5e8b6.jpeg",
"profile_id": 51690243,
"first_name": "Deepti",
"last_name": "Gupta",
"aff": "Texas A&M University-Central Texas",
"title": "",
"industry": "",
"loc": "Austin, United States",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079338,
"name": "Workshop: Security GameDay - Gamified Cybersecurity Defense Training",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland B",
"desc": "\u003Cp\u003EThis interactive session presents Security GameDay, a gamified cybersecurity learning platform that transforms traditional security education through hands-on defense implementation. Originally developed as a Capture the Flag activity, this self-service environment teaches essential security skills by challenging participants to prevent real-world attack scenarios.\u003Cbr\u003EParticipants engage with common vulnerabilities, including database exposure, unauthorized object deletion and SQL injection attacks while establishing comprehensive logging and monitoring systems to detect threats and identify attackers. This dual approach provides experience in both proactive defense and reactive incident response.\u003Cbr\u003EUnlike traditional timed competitions, Security GameDay emphasizes accessibility through achievement-based scoring and flexible delivery formats. The platform accommodates team-based collaborative events and individual self-paced learning, making it adaptable to diverse educational settings and skill levels.The session structure includes foundational background, interactive gameplay and structured feedback collection. This compact format ensures participants gain practical experience while receiving actionable insights for implementing similar programs.\u003Cbr\u003EAttendees will discover strategies for creating engaging cybersecurity education that bridges theoretical knowledge with applied skills. The session demonstrates how gamification accelerates security awareness, builds practical defense capabilities and creates memorable learning experiences across diverse audiences.\u003Cbr\u003EThis session is ideal for cybersecurity educators, training professionals, security practitioners and organizations seeking innovative approaches to security awareness and skill development.\u003C/p\u003E",
"docs": [],
"session_order": 2,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Anjana Krishnan",
"pid": 50917454,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/8998532/f458c023f659cde5a643e34e631426fc.jpeg",
"profile_id": 50917454,
"first_name": "Anjana",
"last_name": "Krishnan",
"aff": "Amazon Web Services",
"title": "Technical Account Manager",
"industry": "",
"loc": "Denver Metropolitan Area",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Ramya Mikkilineni",
"pid": 50917534,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/9010440/83d4bd8b9ff97fac292ffc5033ea77bd.jpeg",
"profile_id": 50917534,
"first_name": "Ramya",
"last_name": "Mikkilineni",
"aff": "Amazon Web Services",
"title": "",
"industry": "",
"loc": "Denver, Colorado",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Sushma Sunkollu Nagaraj",
"pid": 51443559,
"pic": "https://d1keuthy5s86c8.cloudfront.net/wicys_202603/3fd2ec1bebf3fbfb46288d7caf1b02f2289234dff85dda38dad3fd6e660402ea_1/Sunkollu_Nagaraj.jpeg",
"profile_id": 51443559,
"first_name": "Sushma",
"last_name": "Sunkollu Nagaraj",
"aff": "Amazon Web Services",
"title": "Partner Solutions Architect",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Education, Workforce Development and Community",
"id": 887290,
"color": "#00a0a1"
},
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079339,
"name": "Workshop: Agentic AI for Resource-Constrained Campus SOCs: Hands-On, Interpretable Defense",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland C",
"desc": "\u003Cp\u003EColleges that serve low-income and underrepresented communities often face higher cybersecurity risks because of limited budgets, small IT teams and outdated systems. This hands-on workshop shows participants how to build an interpretable AI-based defense system that works within these constraints. Using standard laptops and free cloud credits, attendees will create an open, containerized pipeline for log collection, feature extraction, anomaly detection and triage operations. The focus is on transparency, reproducibility and safety not on proprietary vendor tools.\u003C/p\u003E\n\u003Cp\u003EParticipants will gain practical experience collecting data from learning management systems and email gateways, detecting social engineering indicators and applying model misuse protection with a human-in-the-loop escalation process designed for small analyst teams. The workshop also teaches how to set thresholds to reduce false positives, write short explanations for nontechnical users, and create operational runbooks that ease help desk workloads.\u003C/p\u003E\n\u003Cp\u003EThe session integrates privacy protection through data reduction and anonymization along with methods to verify fairness and language equity. Participants will receive portable notebooks and Docker Compose files with seed datasets, governance checklists and adaptable examples for workforce programs and community cyber clubs. All materials are open access to ensure equitable use in institutions without commercial cybersecurity resources.\u003C/p\u003E",
"docs": [],
"session_order": 3,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Samuel Addington",
"pid": 51321400,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/5755414/17028563e00589d0fb795d5a7b56d2c7.jpeg",
"profile_id": 51321400,
"first_name": "Samuel",
"last_name": "Addington",
"aff": "California State University Long Beach",
"title": "Lecturer",
"industry": "",
"loc": "Cypress, California",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Jesse Chou (ciao)",
"pid": 51321402,
"pic": "https://media.licdn.com/dms/image/v2/C4E03AQGvrFrcPXyG5Q/profile-displayphoto-shrink_200_200/profile-displayphoto-shrink_200_200/0/1516245676831?e=1773273600&v=beta&t=Wn4X_44hALQ17TX88zKXavzVUuAlTA46NsGOjUZhJZ0",
"profile_id": 51321402,
"first_name": "Jesse",
"last_name": "Chou (ciao)",
"aff": "San Bernardino Community College District",
"title": "Professor, CIT/CS",
"loc": "CA",
"bio": "https://www.LinkedIn.com/in/jessechou",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079340,
"name": "Workshop: Tengu Marauder Vanguard: Building and Deploying Modular Cybersecurity Robots",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland D",
"desc": "\u003Cp\u003EThe Tengu Marauder Vanguard is an open-source robotics platform designed for hands-on cybersecurity on wireless networks, IoT environments and embedded systems. It can be used for both defensive and offensive purposes. This platform uses modular hardware like the ESP32 microcontroller, HackRF One and Flipper Zero, along with Python-based control interfaces and tools like ESP32 Marauder firmware and WireGuard VPNs. This workshop will show people how to put the system together and use it in real-life situations such as Wi-Fi reconnaissance, RF signal mapping, deauthentication testing, rogue access point detection and securing mesh networks. This workshop is a great way to get started with cyber physical security education, whether practicing defensive monitoring against wireless threats or simulating red team scenarios. Participants will be able to copy the platform, add to its features, and use it in security labs, classrooms or training settings.\u003C/p\u003E",
"docs": [],
"session_order": 4,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Lexie Thach",
"pid": 51513555,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/7435707/cd57a2349e55214f3dcadabfe81785d7.jpeg",
"profile_id": 51513555,
"first_name": "Lexie",
"last_name": "Thach",
"aff": "Ex Machina Parlor",
"title": "Director",
"industry": "",
"loc": "Philadelphia, Pennsylvania",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Marcela Cordero",
"pid": 51321409,
"pic": "https://media.licdn.com/dms/image/v2/D4D03AQFgZi88EsHt7A/profile-displayphoto-shrink_200_200/profile-displayphoto-shrink_200_200/0/1710528159766?e=1774483200&v=beta&t=uT7oKvCRZABtN4fzhhVRyhUoNYU8_G9kqg-I-fRzXLI",
"profile_id": 51321409,
"first_name": "Marcela",
"last_name": "Cordero",
"aff": "ExMachina Parlor",
"title": "",
"loc": "Pennsville, New Jersey",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
},
{
"name": "Justice Passe",
"pid": 51321412,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10358565/0feef0fc978161502bdba751a95c213f.jpeg",
"profile_id": 51321412,
"first_name": "Justice",
"last_name": "Passe",
"aff": "Ex Machina Parlor",
"title": "Security researcher",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 0,
"has_picture": 1,
"label": "Presenter",
"order": 2
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079341,
"name": "Workshop: Inbox Unmasked: The Email Forensics Odyssey",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland 1-3",
"desc": "\u003Cp\u003EEmail remains the most persistent — and deceptive — attack surface in the modern enterprise. Beyond classic phishing, adversaries now weaponize AI-generated content, QR codes and deepfake impersonations to bypass both filters and intuition. The result: organizations that appear “secured” on paper still experience inbox-driven breaches due to misconfigured authentication layers and inconsistent investigation processes.\u003Cbr\u003EThis workshop arms participants with a structured, repeatable methodology — the E.M.A.I.L. Recon Loop (Examine → Map → Analyze → Inspect → Learn) — that transforms chaotic triage into disciplined digital forensics. Attendees will forensically dissect real messages using open source intelligence and sandboxing platforms such as MXToolbox, Any.Run, URLScan.io, InQuest and Talos Intelligence, learning how to trace threat origins, decode authentication failures (SPF, DKIM, DMARC), and extract indicators of compromise safely and systematically.\u003Cbr\u003EEach participant will walk away understanding not only how to prove if an email is malicious but also why it evaded controls and how to prevent recurrence through better authentication alignment, policy tuning and user reinforcement. By the end of the session, the inbox is no longer a mystery, it becomes a forensic surface where every header, hash and domain tells a story, and every analyst leaves with a toolkit to convert deceptive emails into actionable intelligence and measurable resilience.\u003C/p\u003E",
"docs": [],
"session_order": 5,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Anushree Vaidya",
"pid": 50917455,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/3530805/6a5a70829e93cf69576d67a6d3670288.jpeg",
"profile_id": 50917455,
"first_name": "Anushree",
"last_name": "Vaidya",
"aff": "EXOS",
"title": "Senior Cybersecurity Engineer - Purple Team",
"industry": "",
"loc": "Indianapolis, Indiana",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
},
{
"name": "Sameer Singhal",
"pid": 51321419,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10310040/78ff6722c10b105cb88e5391f1b95778.jpeg",
"profile_id": 51321419,
"first_name": "Sameer",
"last_name": "Singhal",
"aff": "EXOS",
"title": "System Engineer II",
"industry": "",
"loc": "Indianapolis, Indiana",
"bio": "",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 1
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
],
[],
[
{
"start_time": "02:30 PM",
"calendar_stime": "2026-03-13 14:30:00",
"sessions": [
{
"id": 5079342,
"name": "Workshop: Hacking the Hardware: Cybersecurity in Embedded Systems",
"start_time": "14:30",
"end_time": "16:15",
"calendar_stime": "2026-03-13 14:30:00",
"calendar_etime": "2026-03-13 16:15:00",
"place": "Maryland 4-6",
"desc": "\u003Cp\u003EModern cybersecurity places a valuable emphasis on software and networks, but the first point of vulnerability can exist deep in the hardware itself. This interactive workshop introduces participants to the world of embedded device security through a hands-on hacking and defense activity using a microcontroller. \u003C/p\u003E\n\u003Cp\u003EAttendees will connect to a deliberately vulnerable device, observe how unprotected firmware and open serial ports expose sensitive data, and then harden the same device using secure firmware design principles.\u003C/p\u003E\n\u003Cp\u003EThis session blends electrical engineering fundamentals with practical cybersecurity. Participants will dump simple firmware through UART, identify plaintext credentials or logic flaws, and re-flash updated code that implements secure boot or input validation. No prior hardware-hacking experience is required.\u003C/p\u003E\n\u003Cp\u003EBy the end, attendees will have witnessed how physical access to unsecured firmware can compromise an entire system and how embedded devices can be secured with realistic mitigations. Attendees will learn how important the intersection of software and hardware is in cybersecurity. This workshop demystifies this reality by making it visible, physical and attainable.\u003C/p\u003E",
"docs": [],
"session_order": 6,
"session_feedback_enable": true,
"speaker": {
"Presenter": [
{
"name": "Shelby Carroll",
"pid": 51321424,
"pic": "https://d1keuthy5s86c8.cloudfront.net/static/avatar/10296271/26d74c90cef7ba81a5ab18045db616f7.jpeg",
"profile_id": 51321424,
"first_name": "Shelby",
"last_name": "Carroll",
"aff": "Texas A&M University, Corpus Christi",
"title": "Undergraduate Student",
"industry": "",
"loc": "Corpus Christi, Texas, United States",
"bio": "Hello! I am an Electrical Engineering senior (grad. Dec. 2026) with research experience in autonomous soft robotics and self-healing materials, and a strong interest in cybersecurity. Although my resume focuses more on my engineering projects, I have enjoyed learning and developing cyber skills over the past year and a half! Some of my favorite experiences have been competing in three NCL seasons, as well as an IEEE CTF competition.",
"is_enriched": 1,
"is_check_later": 0,
"has_linkedin": 1,
"has_picture": 1,
"label": "Presenter",
"order": 0
}
]
},
"expand": "yes",
"speaker_label": "Session chair",
"type": 1,
"sponsors": [],
"programs": [],
"tracks": [
{
"name": "Technical Skill Building",
"id": 887292,
"color": "#006894"
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"id": 887293,
"color": "#812990"
},
{
"name": "CPEs (2)",
"id": 887296,
"color": "#000000"
}
],
"tags": [
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
],
"nonparallel": false,
"end_time": "04:15 PM"
}
]
]
]
],
"type": "Session",
"formatted_date": "Friday, March 13, 2026"
}
],
"agenda_tracks": [
{
"name": "Career Development, Advancement and Management",
"color": "#b1d34a",
"sess_count": 16,
"id": 887291
},
{
"name": "CPEs (1)",
"color": "#000000",
"sess_count": 35,
"id": 887295
},
{
"name": "CPEs (2)",
"color": "#000000",
"sess_count": 15,
"id": 887296
},
{
"name": "Education, Workforce Development and Community",
"color": "#00a0a1",
"sess_count": 13,
"id": 887290
},
{
"name": "Research and Innovation with Emerging Techniques",
"color": "#f05323",
"sess_count": 13,
"id": 887294
},
{
"name": "Technical Skill Building",
"color": "#006894",
"sess_count": 23,
"id": 887292
},
{
"name": "Tools, Trends, Perspectives and Sector-specific Applications",
"color": "#812990",
"sess_count": 30,
"id": 887293
}
],
"agenda_tags": [
{
"id": 27627,
"name": "Beg/Early Career",
"session_ids": []
},
{
"id": 27635,
"name": "Begnr/Early Career",
"session_ids": []
},
{
"id": 27638,
"name": "Break",
"session_ids": [5079254, 5079287, 5079317]
},
{
"id": 28110,
"name": "Early Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079235, 5079236, 5079237, 5079239, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079280, 5079281, 5079282, 5079283, 5079284, 5079288, 5079289, 5079290, 5079291, 5079292, 5079297, 5079298, 5079299, 5079300, 5079302, 5079303, 5079305, 5079323, 5079324, 5079325, 5079326, 5079329, 5079330, 5079331, 5079332, 5079337, 5079338, 5079339, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27625,
"name": "Invite Only",
"session_ids": [5079218, 5079219, 5079242, 5079243, 5079244, 5079245, 5079246, 5079249, 5079250, 5079314]
},
{
"id": 27637,
"name": "Keynote",
"session_ids": [5079253, 5079275, 5079309, 5079316]
},
{
"id": 27630,
"name": "Laptop Recommended",
"session_ids": [5079230, 5079233, 5079238, 5079337, 5079340]
},
{
"id": 27631,
"name": "Laptop Required",
"session_ids": [5079232, 5079239, 5079240, 5079241, 5079338, 5079339, 5079341, 5079342, 5138734, 5213249]
},
{
"id": 27636,
"name": "Mid Career",
"session_ids": [5079220, 5079221, 5079230, 5079232, 5079233, 5079234, 5079235, 5079236, 5079237, 5079238, 5079239, 5079240, 5079241, 5079261, 5079262, 5079263, 5079264, 5079265, 5079267, 5079268, 5079269, 5079270, 5079271, 5079272, 5079281, 5079282, 5079283, 5079284, 5079285, 5079288, 5079289, 5079290, 5079291, 5079292, 5079296, 5079297, 5079298, 5079299, 5079302, 5079303, 5079304, 5079305, 5079322, 5079323, 5079324, 5079325, 5079326, 5079328, 5079329, 5079330, 5079331, 5079337, 5079338, 5079339, 5079340, 5079341, 5079342, 5138734, 5161297, 5213249]
},
{
"id": 27628,
"name": "Mid-Career",
"session_ids": []
},
{
"id": 27626,
"name": "OnSite SignUp",
"session_ids": [5079225, 5079226, 5079227, 5079228, 5079229, 5079260, 5079286, 5079295, 5079307, 5079311, 5079321, 5079336]
},
{
"id": 27629,
"name": "Senior Career",
"session_ids": [5079220, 5079221, 5079232, 5079233, 5079234, 5079237, 5079238, 5079239, 5079241, 5079261, 5079262, 5079267, 5079268, 5079269, 5079271, 5079282, 5079285, 5079289, 5079296, 5079298, 5079302, 5079303, 5079304, 5079324, 5079328, 5079330, 5079331, 5079339, 5079340, 5079342, 5213249]
}
]
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment