Keynotes Sneak Peek

An early hint of keynotes to come.

Every year, our keynote sessions are a highly anticipated Conference feature—and for good reason. The diverse backgrounds of our keynote speakers ensure a fascinating look at where the industry stands now, and where it’s headed in the future.

We’ll soon be announcing our complete keynote lineup, but in the meantime, here is a preview of the kind of informative—and unique—perspectives you can expect this year:

Tales of a Teenage Security Supergirl

Tuesday, 16 July 16:20 – 16:40 hrs

Kyla Guru will share her story of being a social entrepreneur in the cybersecurity industry, the challenges she has faced and what she believes should be the greater mission of all cybersecurity initiatives. Guru will use her unique perspective of going through the education system to talk about what she sees for the future of the industry, and, of course, how we can make radical change to our current state of cyber-insecurity.

Kyla Guru

The Five Most Dangerous New Attack Techniques and How to Counter Them

Wednesday, 17 July 13:30 – 14:15 hrs

Presented by the SANS Institute, this keynote panel will reveal the most dangerous new attack techniques. How do they work? How can you stop them? What’s coming next and how can you prepare? These questions will be answered by the three people best positioned to provide them: the director of the Internet Storm Center, Singapore's top expert/teacher on mobile forensics, and the top hacker exploits expert/teacher in the US. 

They will also answer audience questions.

SANS panel

The Hugh Thompson Show: DeepFakes and The Human Zero Day

Thursday, 18 July   14:55 - 15:40

The greatest threats we’ve ever faced sit inside the human mind. Technological advances are socially engineering and exploiting human zero days, with DeepFakes that are harder and harder to discern. This sure-to-be-memorable closing keynote takes you behind the scenes of how it all really works, exploring what it is about humans that makes us susceptible to getting pwned, manipulated and otherwise compromised, how DeepFakes and AI are being weaponized, and how this forever changes defense strategies.

keynotes image


This document was retrieved from on Fri, 24 May 2019 22:09:14 -0400.