Close menu Resources for... William & Mary
W&M menu close William & Mary

VASCAN Schedule

2024 lineup of speakers, trainings, keynotes and more!

We are excited to welcome you to beautiful Williamsburg for two days of presentations, keynotes, panels, activities and more! Browse the conference schedule to see the array of presentations planned from institutions across the Commonwealth.

Read session descriptions

Thursday, October 10th
2024 VASCAN schedule
Start Time End Time Location Presentation Title
7:15am 8:20am Main Lobby Registration in Main Lobby & Breakfast Seating in Hunter Hall A & B
7:30am 4:30am Hunter Hall Foyer & Lobbies Sponsor Exhibit Areas (closed for lunch 11:15 AM - 11:45 AM), Break Refreshments & Buffets for Meals
8:00am 5:00pm KA Lounge Lock Pick Village - Sponsored by Rotas Security
8:30am 9:30am Kaplan Gallery/Board Room (2nd Floor) Go Beyond with Identity
8:30am 9:30am Hunter Hall B Round-the-Clock Security: Our Journey to an InHouse 24/7 SOC
8:30am 9:30am Hunter Hall A Securing a multitenant application Platform
8:30am 9:30am Leadership Hall (2nd Floor) The Night Watch - Adventures in setting up a Student SOC
9:30am 9:40am Hunter Hall Foyer & Lobbies BREAK
9:40am 10:50am Hunter Hall A Welcome & Keynote - Dr. Kira Allmann
10:50am 11:00am Hunter Hall Foyer & Lobbies BREAK
11:00am 12:00pm Kaplan Gallery/Board Room (2nd Floor) Agentless Zero Trust Segmentation
11:00am 12:00pm Hunter Hall B Securing Decentralized Devices: Device Security Initiative (DSI)
11:00am 12:00pm Leadership Hall (2nd Floor) The Needs of the Many Outweigh the Scams of the Few
11:00am 12:00pm Hunter Hall A What Have We Been Doing?
12:00pm 1:00pm Hunter Hall LUNCH
1:00pm 2:00pm Hunter Hall A FBI Panel - Cyber Threats & Crime
2:00pm 2:10pm Hunter Hall Foyer & Lobbies BREAK
2:10pm 3:10pm Hunter Hall A Modern IR Diaries - Lessons learned from a cyber attack
2:10pm 3:10pm Leadership Hall (2nd floor) Opt in Workflows - Deploying centralized workflows in a decentralized environment
2:10pm 3:10pm Hunter Hall B Responding Quickly to Compromised Credentials
3:10pm 3:20pm Hunter Hall Foyer & Lobbies BREAK
3:20pm 4:20pm Hunter Hall A AI Opening Experience: Managing security through a Generative AI revolution
3:20pm 4:20pm Leadership Hall (2nd Floor) Anatomy of a Hack Part 2 Lessons Learned
3:20pm 4:20pm Hunter Hall B The World of Personal RF Security
4:20pm 4:30pm Hunter Hall Foyer & Lobbies BREAK
4:30 PM 5:30pm Leadership Hall (2nd Floor) Defend Against Cyberattacks with No-Cost Resources from the MS-ISAC
4:30 PM 5:30pm Hunter Hall A Post-SASEImplementation: A 1 Year Look Back
4:30 PM 5:30pm Hunter Hall B Web Vulnerability Management at Scale
5:30pm 6:30pm Hunter Hall A Welcome Reception & Founder's Award
Session descriptions
Friday, October 11th
friday schedule
Start time End time Location Presentation title
7:30am 8:20am Main lobby Registration in Main Lobby & Breakfast Seating in Hunter Hall A & B
8:00am 1:00pm Hunter Hall Foyer & Lobbies Sponsor Exhibit Areas (closed for lunch 12:15 PM - 12:45 PM), Break Refreshments & Buffets for Meals
8:30am  12:00pm KA Lounge Lock Pick Village - Sponsored by Rotas Security
8:30am  4:30pm Hunter Hall B TRAINING: Advanced Search Engine Intelligence and Information Integrity
8:30am  9:30am  Hunter Hall A Securing the Future: Navigating Microsoft Purview for Information Protection
8:30am 9:30am Leadership Hall (2nd Floor) Eliminating Network Attack Surface in Campus Networking
9:30am 9:40am Hunter Hall Foyer & Lobbies BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments
9:40am  10:40am Kaplan Gallery/Board Room (2nd Floor) Use Cases - What Does Zero Trust Mean For You?
9:40am  10:40am Leadership Hall (2nd Floor) Linux Forensic Investigation: A Case Study
9:40am  10:40am Hunter Hall A Security Awareness Programs for Students
10:40am 10:50am Hunter Hall Foyer & Lobbies BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments
10:50am 11:50am Kaplan Gallery/Board Room (2nd Floor) Information Security and Records Management - Higher Ed's Most Overlooked Partnership
10:50am 11:50am Leadership Hall (2nd Floor) Cyber Security Insurance Best Practices
10:50am 11:50am Hunter Hall A IT Procurement Review Process - In search of SOCs and VPATS
11:50am 12:00pm Hunter Hall Foyer & Lobbies BREAK - Head to Next Session, Visit the Sponsor Exhibit Area & Get Refreshments
12:00pm 1:00pm Hunter Hall A Ransomware 4.0: Examining Cybersecurity Incidents from All Angles
12:00pm 1:00pm Leadership Hall (2nd Floor) Enhancing Security: Building an Internal Red Team for Academic Organizations
1:00pm 2:00pm Hunter Hall A

LUNCH - Lock Pick Village Contest Prizes & Attendee Prize Give Aways

Buffet will be served in Hunter Hall Foyer & Seating will be in Hunter Hall A/B