8th Annual Peak Cyber - CSTTF


If you have already registered and would like to change your training session selection, please click here.

Previous CSTTF Agendas

2017 Agenda
2016 Agenda

**Just Announced: Capture the Flag Event at Peak Cyber**

Separate Registration Required

Click Here to Register

Click here for more information

2018 Agenda

Click a block to view session details

Print Agenda

Capture the Flag Event at Peak Cyber

Tuesday, August 21, 2018
TimeAgenda Item
9:30 AM -
10:30 AM
Workshop Registration

CTF- Douglas Room

10:30 AM -
11:00 AM
Rules Overview

CTF- Douglas Room

11:00 AM -
3:30 PM

CTF- Douglas Room

3:30 PM -
5:00 PM
Trophy Presentation & Happy Hour

CTF- Douglas Room

Peak Cyber Day 1

Wednesday, August 22, 2018
TimeAgenda Item
7:00 AM -
8:30 AM
Registration and Continental Breakfast - Exibits Open

Grand Ballroom & Ballroom Foyer

8:30 AM -
8:40 AM
Welcome Remarks
  • Colleen Murphy

    President, ISSA-COS Chapter

8:40 AM -
9:30 AM
  • Dr. Ron Ross

    Computer Security Division, National Institute of Standards and Technology Information Technology Laboratory

9:30 AM -
9:40 AM
Break - Exhibits

9:40 AM -
10:50 AM
Cyber Warfighter Panel 2.0
  • Moderator
  • Dr. Andrew Heo

    Chief Cybersecurity Engineer, ITS, LLC
  • Panelists
  • Amy Coffman

    ITIL v3 Foundation/Auditor - Missile Defense Agency (MDA), Cybersecurity Director - Command and Control, Battle Management and Communications (C2BMC)
  • Dennis Knoop

    Chief Technology Officer, NORAD and USNORTHCOM/J68
  • Dr. Joseph Mitola III

    Fellow of the IEEE, Chief Technologist, ENSCO Aerospace Sciences and Engineering Division
  • Dr. Shawn P. Murray

    Director, International Board, Information Systems Security Association (ISSA)

10:50 AM -
11:00 AM
Break - Exhibits

11:00 AM -
11:30 AM
Keynote: Phased Approaches for Effective and Affordable Cybersecurity Protection
  • Aaron Shaha

    Director of Network Defense Operations (NDO) & Data Science, Root9b

11:30 AM -
11:45 AM
Break - Exhibits

11:45 AM -
12:15 PM
The Cyber Social Construct: How to Develop a Continuously Succeeding Organization
  • Dr. Andrew Heo

    Chief Cybersecurity Engineer, ITS, LLC
From Tactical to Practical: Getting Incident Response Right
  • Daniel Ziesmer

    President, Centripetum, LLC
How to Use the Cyber Kill Chain Methodology Effectively
  • Brian Wrozek

    Managing Executive Director, Office of the CISO, Optiv Security

12:15 PM -
1:15 PM
Lunch - On Your Own

1:15 PM -
1:45 PM
Why SOCs Fail: Understanding The Threat, Avoiding Disaster
  • Jack Callaghan

    Senior Security Engineer, Information Security Group, Pulte Financial Services
Introducing the Colorado Threat Information Sharing (CTIS) Initiative
  • Rich Schliep

    Chief Information Security Officer - Network Manager, Colorado Department of State
  • Tim McCain

    CISO, City of Aurora, CO
  • Stephen E. Coury

    Chief Information Security Officer, The City and County of Denver
Rethink Cyber Security: The Human Point
  • Vickie Brown

    Client Executive, Forcepoint

1:45 PM -
2:00 PM
Break - Exhibits

2:00 PM -
2:30 PM
Ready Player 0x01: How Gamified Ecosystems Will Save Us All
  • Evan Dornbush

    Co-founder & CEO, Point3 Security, Inc.
Introducing the Colorado Threat Information Sharing (CTIS) Initiative (Continued)
SSH Keys: Security Asset or Liability?
  • Kevin Steinhauser

    Professional Services Consultant and Enterprise Architect, Venafi

2:30 PM -
2:45 PM
Dessert in Exhibit Area

2:45 PM -
3:15 PM
Fit for Use Fit for Purpose
  • Westley McDuffie

    Security Evangelist, IBM
You Own Your Computer, I Own You
  • DrPH Greg Carpenter

    , Owner, GCE, LLC & International Board of Advisors, Mackenzie Institute
Cyber Range as a Service
  • Chuck Reynolds

    Founder and CTO, Technical Systems Integrators, Inc.

3:15 PM -
3:20 PM

3:20 PM -
3:50 PM
Continuous Security: Making the Leap from DevOps to DevSecOps
  • George Gerchow

    Chief Security Officer, Sumo Logic
Human Hacking: The Psychology Behind Cyber Security
  • Erik Huffman

    Founder & CEO, Handshake Leadership
Cyber Security for Industrial Control Systems Current and Future
  • Aaron Fansler

    Chief Technologist for Cyber & ISR, Ampex Intelligent Systems

3:50 PM -
4:00 PM

4:00 PM -
4:40 PM
Best Practices and Tools for Reducing Insider Threats
  • Sean Martinez

    Senior Federal Systems Engineer, SolarWinds
Gaining Efficiencies Under the Risk Management Framework (RMF) by Leveraging Automation
  • Tim Cordova

    Federal Cyber Security Lead, GTRI, now Zivaro

4:40 PM -
4:50 PM

4:50 PM -
5:30 PM
Closing Keynote on Career Development: TBA
  • Jeff Snyder

    President, Jeff Snyder Coaching & SecurityRecruiter.com

5:30 PM -
7:00 PM
Cybersecurity Career Lifecycle Social: All Peak Cyber Participants are Invited!

Peak Cyber Day 2

Thursday, August 23, 2018
TimeAgenda Item
7:30 AM -
8:30 AM
Continental Breakfast in Exhibit Area

8:30 AM -
8:45 AM
Welcome Remarks

8:45 AM -
9:45 AM
  • COL Robert McVay

    Deputy CIO, Missile Defense Agency (MDA)

9:45 AM -
10:00 AM
Break - Exhibits

10:00 AM -
10:50 AM
  • Dr. Dale W. Meyerrose

    Major General USAF Retired, President, MeyerRose Group

10:50 AM -
11:00 AM
Break - Exhibits

11:00 AM -
11:50 AM
  • Dr. Joseph Mitola III

    Fellow of the IEEE, Chief Technologist, ENSCO Aerospace Sciences and Engineering Division

11:50 AM -
1:00 PM
Lunch - On Your Own

1:00 PM -
4:00 PM
Training Session
CompTIA Penetration Testing and Cybersecurity Analyst Mini-Boot Camp
Training Session
Phoenix TS Strategic Network Security Monitoring with Security Onion
Training Session
Cyber Forensics Lab
  • Digital Forensics Workflow
  • Dr. Michael J. (MJ) Staggs

    Forensic Scientist, Nuix