Schedule
Conference Schedule
Detailed schedule for the 2025 Conference, including sessions, workshops, and keynote presentations.
The 2025 Conference spans three exciting days packed with learning, networking, and collaboration opportunities. All times are local to Cayman (UTC-5).
Workshops
8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:30 AM
Morning Workshops
API Undergroud: Red Team Hacking Secrets
Speaker: Parth Shukla
Location: Workshop Room 1
Speaker: Parth Shukla
Location: Workshop Room 1
Cyber Tricks and Laundering Flicks
Securing Multi-Cloud Environments
Speaker: Georgia Scott
Location: Workshop Room 2
Speaker: Georgia Scott
Location: Workshop Room 2
Threat Intel Crash Course
Speaker: John Stoner, Andy Piazza
Location: Workshop Room 3
Speaker: John Stoner, Andy Piazza
Location: Workshop Room 3
How to Get Started with Hacking (From Zero to Hero)
Speaker: David Wright
Location: Workshop Room 4
Speaker: David Wright
Location: Workshop Room 4
12:00 PM
Lunch
Lunch with local Caribbean cuisine and networking
Ave; through Breezeway
1:30 PM
Afternoon Workshops
Threat Intelligence & Detection
Floating Like a Cloud, Guarding Like a Fortress: Practical Guide to Cloud Security Governance
Speaker: Shinesa Cambric
Location: Workshop Room 1
Speaker: Shinesa Cambric
Location: Workshop Room 1
Flipside! Remote Badge Cloning with the Flipper Zero
Speaker: Langsont Clement
Location: Workshop Room 2
Speaker: Langsont Clement
Location: Workshop Room 2
Open Source AI and Granite
Speaker: JJ Asghar
Location: Workshop Room 3
Speaker: JJ Asghar
Location: Workshop Room 3
Cyber Werewolves: Emulating the Enemy Before the Full Moon Rises
Speaker: Roxey Davis
Location: Workshop Room 4
Speaker: Roxey Davis
Location: Workshop Room 4
Keynotes
8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:50 AM
Opening
A word from the organizers
9:00 AM
Premier Andre Ebanks
9:30 AM
John Hammond
Surprise title - don't miss out!
10:30 AM
Coffee Break
10:45 AM
John Watson
Surprise title - don't miss out!
11:45 AM
Lunch
1:00 PM
Adam Arellano
Surprise title - don't miss out!
2:00 PM
Robert Wood
The 80/20 Fix: TPRM That Works Even When Your Vendors Don't
2:45 PM
Jake Wnuk
AppSec Through Application: The Story of Jabbercracky
3:50 PM
Coffee Break
4:05 PM
Adam Pennington
Surprise title - don't miss out!
5:05 PM
Katie Paxton-Fear
So Your Developers Hate You...How to Turn Reluctant Devs into AppSec Champions
Technical Track
8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
9:00 AM
Sunligh on the Shadow Workers: Hunting State-Sponsored Corporate Espionage
Will Baggett9:45 AM
Risky Business: Identity Protection Traps When Pentesting Entra ID Environments
Scott Thomas10:30 AM
Automating Threat Modeling: Challenges and AI Solutions
Audrey Long11:15 AM
Coffee Break
11:30 AM
DFIR as Code: Automating AWS Incident Response
Jonathan Davis12:15 PM
Securing the Cloud: Understanding Threats and Building Resilience in SaaS Environments
Nicole Morris1:00 PM
Lunch Break
2:00 PM
AI's Achilles' Heel: Why Trusting Your Agents Starts With Securing Their NHIs
Michael Silva2:45 PM
Harbouring Hackers
Charles Bain3:30 PM
Coffe Break
3:45 PM
Noon to Goon: Ten Years Too Soon
Mick Baccio, Michael RodriguezCompliance Track
8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:45 AM
Demystifying GRC for AI Integration
Daniel Powery9:30 AM
Cyber Werewolves: Rewriting the Rules to the Game Against Insider Threats
Roxey Davis10:15 AM
Privacy and Cybersecurity: A Love Story (With Plot Twists) of Data's Dynamic Duo
Michael Castro11:00 AM
Coffee Break
11:15 AM
Beyond the Checkbox: How to Actually Manage Vendor Risk
Paul Ihme12:00 PM
Maritime Security
Jeff Ames12:45 PM
TBC
Neha Nair1:30 PM
Lunch
2:45 PM
To Scan or Not to Scan? That Just Might Be Qishing
Angus Chen3:30 PM
Coffe Break
3:45 PM
Managed Services: Why They Fail and Who Is Responsible
Garry Coldwells4:30 PM