Loading…
Attending this event?
Tuesday, June 25
 

7:30am PDT

Check-In
Tuesday June 25, 2024 7:30am - 8:30am PDT
Bay D Foyer

8:45am PDT

Welcome - Keynote

Tuesday June 25, 2024 8:45am - 9:15am PDT
Bay D - Room 1 - Marigold

9:15am PDT

2 1/2 Day Course - Track 1 - Securing Your Network: Zero Trust, Ethical Hacking, Privacy Awareness, and Next-Gen Firewall Best Practices

Join this comprehensive course designed to equip you with essential knowledge and skills to enhance your network security. Explore the concept of Zero Trust Networks (ZTN) and learn how to implement this robust security model within your organization. Gain valuable insights into the mindset of a hacker, enabling you to better defend against their techniques. Understand the dangers of oversharing sensitive information and the risks associated with underpatching systems. Discover best practices for configuring and managing your firewall to ensure optimal security. By the end of this course, you will be equipped with a holistic understanding of network security and be empowered to implement effective strategies to protect your organization's assets.

Course Duration: 2-day course with a third half-day focused
Track to include: Hands-On Exercises
What to bring: Personal Laptop 

Prerequisites: TBD

Resources / Presentations - We'll link to all presentations when the event starts.

Registration Information:
  • Single registration per Sched/email account.  If you have multiple team members attending, each attendee will need to sign up for the event individually.
  • Only sign up for one track. Each track is designed for multiple-day learning and track hopping is not permitted due to the limited seating in each track.  The third day is a half-day course; all tracks will be combined for a group discussion.



Tuesday June 25, 2024 9:15am - Thursday June 27, 2024 12:30pm PDT
Bay D - Room 1 - Marigold

9:15am PDT

2 1/2 Day Course - Track 2 - Cyber Hunting License: Tools and skills to hunt in your own environment for malware and vulnerabilities

Obtain your Cyber Hunting License and acquire the necessary tools and skills to proactively hunt for malware and vulnerabilities within your own environment. This course empowers you with the knowledge to effectively detect, analyze, and neutralize potential threats, ensuring the security of your systems. Develop expertise in using cutting-edge tools and techniques to stay one step ahead of cyber attackers. Take control of your organization's security by enrolling in this comprehensive course today.

Course Duration: 2-day course with a third half-day focused
Track to include: Hands-On Exercises
What to bring: Personal Laptop 

Resources / Presentations - To be linked after the event starts. 

Registration Information:
  • Single registration per Sched/email account.  If you have multiple team members attending, each attendee will need to sign up for the event individually.
  • Only sign up for one track. Each track is designed for multiple-day learning and track hopping is not permitted due to the limited seating in each track.  The third day is a half-day course; all tracks will be combined for a group discussion.


Tuesday June 25, 2024 9:15am - Thursday June 27, 2024 12:30pm PDT
Bay D - Room 2 - Poppy

9:15am PDT

2 1/2 Day Course - Track 3 - Enhance your cybersecurity expertise as an IT director, CTO, or technology leader. Firsthand peer experiences of being "hacked" ; expert training on Disaster Recovery, Incident Response, and Business Continuity

Join our exclusive cybersecurity course led by CTOs and IT leadership, designed to provide invaluable insights into disaster recovery, incident response, and business continuity. Learn from the firsthand experiences of industry experts and engage in hands-on tabletop exercises to develop practical skills in handling cyber threats. Gain peer perspectives, collaborate with fellow professionals, and acquire the knowledge necessary to effectively safeguard your organization's critical assets. Enhance your expertise in cybersecurity and emerge as a confident leader in ensuring the resilience and security of your IT infrastructure.

Course Duration: 2-day course with a third half-day focused
Track to include: Table Top Exercises
What to bring: Personal Computer 

Resources / Presentations - To be linked after the event starts.

Registration Information:
  • Single registration per Sched/email account.  If you have multiple team members attending, each attendee will need to sign up for the event individually.
  • Only sign up for one track. Each track is designed for multiple-day learning and track hopping is not permitted due to the limited seating in each track.  The third day is a half-day course; all tracks will be combined for a group discussion.


Tuesday June 25, 2024 9:15am - Thursday June 27, 2024 12:30pm PDT
Bay D - Room 3 - Broadcast
 
Wednesday, June 26
 

6:00pm PDT

CDWG Top Golf Event - RSVP NEEDED - Add this session to your sched to RSVP. Limited Capacity

Work Hard. Play Hard.  

Join us at Top Golf for a free evening of fun after an eventful day of cybersecurity training.

To RSVP for this event simply add this session to your Sched schedule. Please only register for the event if you can make it, as space is limited.  

Once the event reaches capacity you will be added to the waitlist. If any space does free up, you will then be emailed confirming your reservation.

Event hosted by CDWG.


Wednesday June 26, 2024 6:00pm - 8:00pm PDT
Top Golf
 
Filter sessions
Apply filters to sessions.