VASCAN Schedule
2024 lineup of speakers, trainings, keynotes and more!
We are excited to welcome you to beautiful Williamsburg for two days of presentations, keynotes, panels, activities and more! Browse the conference schedule to see the array of presentations planned from institutions across the Commonwealth.
Thursday, October 10th
Start Time | End Time | Location | Presentation Title |
---|---|---|---|
7:15am | 8:20am | Main Lobby | Registration in Main Lobby & Breakfast Seating in Hunter Hall A & B |
7:30am | 4:30am | Hunter Hall Foyer & Lobbies | Sponsor Exhibit Areas (closed for lunch 11:15 AM - 11:45 AM), Break Refreshments & Buffets for Meals |
8:00am | 5:00pm | KA Lounge | Lock Pick Village - Sponsored by Rotas Security |
8:30am | 9:30am | Kaplan Gallery/Board Room (2nd Floor) | Go Beyond with Identity |
8:30am | 9:30am | Hunter Hall B | Round-the-Clock Security: Our Journey to an InHouse 24/7 SOC |
8:30am | 9:30am | Hunter Hall A | Securing a multitenant application Platform |
9:30am | 9:40am | Hunter Hall Foyer & Lobbies | BREAK |
9:40am | 10:50am | Hunter Hall A | Welcome & Keynote - Dr. Kira Allmann |
10:50am | 11:00am | Hunter Hall Foyer & Lobbies | BREAK |
11:00am | 12:00pm | Kaplan Gallery/Board Room (2nd Floor) | Agentless Zero Trust Segmentation |
11:00am | 12:00pm | Hunter Hall B | Securing Decentralized Devices: Device Security Initiative (DSI) |
11:00am | 12:00pm | Leadership Hall (2nd Floor) | The Needs of the Many Outweigh the Scams of the Few |
11:00am | 12:00pm | Hunter Hall A | What Have We Been Doing? |
12:00pm | 1:00pm | Hunter Hall | LUNCH |
1:00pm | 2:00pm | Hunter Hall A | FBI Panel - Cyber Threats & Crime |
2:00pm | 2:10pm | Hunter Hall Foyer & Lobbies | BREAK |
2:10pm | 3:10pm | Hunter Hall A | Modern IR Diaries - Lessons learned from a cyber attack |
2:10pm | 3:10pm | Leadership Hall (2nd floor) | Opt in Workflows - Deploying centralized workflows in a decentralized environment |
2:10pm | 3:10pm | Hunter Hall B | Responding Quickly to Compromised Credentials |
3:10pm | 3:20pm | Hunter Hall Foyer & Lobbies | BREAK |
3:20pm | 4:20pm | Hunter Hall A | AI Opening Experience: Managing security through a Generative AI revolution |
3:20pm | 4:20pm | Leadership Hall (2nd Floor) | Anatomy of a Hack Part 2 Lessons Learned |
3:20pm | 4:20pm | Hunter Hall B | The World of Personal RF Security |
4:20pm | 4:30pm | Hunter Hall Foyer & Lobbies | BREAK |
4:30 PM | 5:30pm | Leadership Hall (2nd Floor) | Defend Against Cyberattacks with No-Cost Resources from the MS-ISAC |
4:30 PM | 5:30 PM | Hunter Hall A | The Night Watch - Adventures in setting up a Student SOC |
4:30 PM | 5:30pm | Hunter Hall B | Web Vulnerability Management at Scale |
5:30pm | 6:30pm | Hunter Hall A | Welcome Reception & Founder's Award |
Session descriptions
Friday, October 11th
Start time | End time | Location | Presentation title |
---|---|---|---|
7:30am | 8:20am | Main lobby | Registration in Main Lobby & Breakfast Seating in Hunter Hall A & B |
8:00am | 1:00pm | Hunter Hall Foyer & Lobbies | Sponsor Exhibit Areas (closed for lunch 12:15 PM - 12:45 PM), Break Refreshments & Buffets for Meals |
8:30am | 12:00pm | KA Lounge | Lock Pick Village - Sponsored by Rotas Security |
8:30am | 4:30pm | Hunter Hall B | TRAINING: Advanced Search Engine Intelligence and Information Integrity |
8:30am | 9:30am | Hunter Hall A | Securing the Future: Navigating Microsoft Purview for Information Protection |
8:30am | 9:30am | Leadership Hall (2nd Floor) | Eliminating Network Attack Surface in Campus Networking |
9:30am | 9:40am | Hunter Hall Foyer & Lobbies | BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments |
9:40am | 10:40am | Kaplan Gallery/Board Room (2nd Floor) | Use Cases - What Does Zero Trust Mean For You? |
9:40am | 10:40am | Leadership Hall (2nd Floor) | Linux Forensic Investigation: A Case Study |
9:40am | 10:40am | Hunter Hall A | Security Awareness Programs for Students |
10:40am | 10:50am | Hunter Hall Foyer & Lobbies | BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments |
10:50am | 11:50am | Kaplan Gallery/Board Room (2nd Floor) | Information Security and Records Management - Higher Ed's Most Overlooked Partnership |
10:50am | 11:50am | Leadership Hall (2nd Floor) | Cyber Security Insurance Best Practices |
10:50am | 11:50am | Hunter Hall A | IT Procurement Review Process - In search of SOCs and VPATS |
11:50am | 12:00pm | Hunter Hall Foyer & Lobbies | BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments |
12:00pm | 1:00pm | Hunter Hall A | Ransomware 4.0: Examining Cybersecurity Incidents from All Angles |
12:00pm | 1:00pm | Leadership Hall (2nd Floor) | Enhancing Security: Building an Internal Red Team for Academic Organizations |
1:00pm | 2:00pm | Hunter Hall A |
LUNCH - Lock Pick Village Contest Prizes & Attendee Prize Give Aways Buffet will be served in Hunter Hall Foyer & Seating will be in Hunter Hall A/B |