Schedule

Conference Schedule

Detailed schedule for the 2025 Conference, including sessions, workshops, and keynote presentations.

The 2025 Conference spans three exciting days packed with learning, networking, and collaboration opportunities. All times are local to Cayman (UTC-5).

Workshops

8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:30 AM
Morning Workshops
API Undergroud: Red Team Hacking Secrets
Speaker: Parth Shukla
Location: Workshop Room 1
Cyber Tricks and Laundering Flicks Securing Multi-Cloud Environments
Speaker: Georgia Scott
Location: Workshop Room 2
Threat Intel Crash Course
Speaker: John Stoner, Andy Piazza
Location: Workshop Room 3
How to Get Started with Hacking (From Zero to Hero)
Speaker: David Wright
Location: Workshop Room 4
12:00 PM
Lunch

Lunch with local Caribbean cuisine and networking

Ave; through Breezeway
1:30 PM
Afternoon Workshops
Threat Intelligence & Detection Floating Like a Cloud, Guarding Like a Fortress: Practical Guide to Cloud Security Governance
Speaker: Shinesa Cambric
Location: Workshop Room 1
Flipside! Remote Badge Cloning with the Flipper Zero
Speaker: Langsont Clement
Location: Workshop Room 2
Open Source AI and Granite
Speaker: JJ Asghar
Location: Workshop Room 3
Cyber Werewolves: Emulating the Enemy Before the Full Moon Rises
Speaker: Roxey Davis
Location: Workshop Room 4

Keynotes

8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:50 AM
Opening

A word from the organizers

9:00 AM
Premier Andre Ebanks
9:30 AM
John Hammond

Surprise title - don't miss out!

10:30 AM
Coffee Break
10:45 AM
John Watson

Surprise title - don't miss out!

11:45 AM
Lunch
1:00 PM
Adam Arellano

Surprise title - don't miss out!

2:00 PM
Robert Wood

The 80/20 Fix: TPRM That Works Even When Your Vendors Don't

2:45 PM
Jake Wnuk

AppSec Through Application: The Story of Jabbercracky

3:50 PM
Coffee Break
4:05 PM
Adam Pennington

Surprise title - don't miss out!

5:05 PM
Katie Paxton-Fear

So Your Developers Hate You...How to Turn Reluctant Devs into AppSec Champions

Technical Track

8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
9:00 AM
Sunligh on the Shadow Workers: Hunting State-Sponsored Corporate Espionage
Will Baggett
9:45 AM
Risky Business: Identity Protection Traps When Pentesting Entra ID Environments
Scott Thomas
10:30 AM
Automating Threat Modeling: Challenges and AI Solutions
Audrey Long
11:15 AM
Coffee Break
11:30 AM
DFIR as Code: Automating AWS Incident Response
Jonathan Davis
12:15 PM
Securing the Cloud: Understanding Threats and Building Resilience in SaaS Environments
Nicole Morris
1:00 PM
Lunch Break
2:00 PM
AI's Achilles' Heel: Why Trusting Your Agents Starts With Securing Their NHIs
Michael Silva
2:45 PM
Harbouring Hackers
Charles Bain
3:30 PM
Coffe Break
3:45 PM
Noon to Goon: Ten Years Too Soon
Mick Baccio, Michael Rodriguez

Compliance Track

8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:45 AM
Demystifying GRC for AI Integration
Daniel Powery
9:30 AM
Cyber Werewolves: Rewriting the Rules to the Game Against Insider Threats
Roxey Davis
10:15 AM
Privacy and Cybersecurity: A Love Story (With Plot Twists) of Data's Dynamic Duo
Michael Castro
11:00 AM
Coffee Break
11:15 AM
Beyond the Checkbox: How to Actually Manage Vendor Risk
Paul Ihme
12:00 PM
Maritime Security
Jeff Ames
12:45 PM
TBC
Neha Nair
1:30 PM
Lunch
2:45 PM
To Scan or Not to Scan? That Just Might Be Qishing
Angus Chen
3:30 PM
Coffe Break
3:45 PM
Managed Services: Why They Fail and Who Is Responsible
Garry Coldwells
4:30 PM
AI, Ethics, and the Cayman Islands DPA: Building Trust in the Age of Automation
Adriana Winkler