Schedule

Conference Schedule

Detailed schedule for the 2025 Conference, including sessions, workshops, and keynote presentations.

The 2025 Conference spans three exciting days packed with learning, networking, and collaboration opportunities. All times are local to Cayman (UTC-5).

Workshops

8:00 AM
Registration and Workshop Check-in
Grand Ballroom Foyer
8:30 AM
Morning Workshops
Floating Like a Cloud, Guarding Like a Fortress: Practical Guide to Cloud Security Governance
Speaker: Shinesa Cambric
Location: Workshop Room 1
Threat Intel Crash Course
Speaker: John Stoner, Andy Piazza
Location: Workshop Room 2
How to Get Started with Hacking (From Zero to Hero)
Speaker: David Wright
Location: Workshop Room 3
12:00 PM
Lunch

Lunch with local Caribbean cuisine and networking

Ave; through Breezeway
1:30 PM
Afternoon Workshops
Cyber Tricks and Laundering Flicks
Speaker: Georgia Scott, RJ Berry
Location: Workshop Room 1
Flipside! Remote Badge Cloning with the Flipper Zero
Speaker: Langston Clement
Location: Workshop Room 2
Framework Forward: Mastering the Mechanics of NIST CSF v2
Speaker: Ebony Pierce
Location: Workshop Room 3

Keynotes

8:00 AM
Registration
Grand Ballroom Foyer
8:50 AM
Opening

A word from the organizers

9:00 AM
Honourable André Ebanks, MP

Premier; Minister for Financial Services & Commerce

9:20 AM
Honourable Isaac Rankine, JP, MP

Minister for Social Development & Innovation; Minister for Youth, Sports, Culture & Heritage

9:30 AM
John Hammond

Surprise title - don't miss out!

10:30 AM
Coffee Break
10:45 AM
John Watson

Surprise title - don't miss out!

11:45 AM
Lunch
1:00 PM
Adam Arellano

Surprise title - don't miss out!

2:00 PM
Jake Wnuk

AppSec Through Application: The Story of Jabbercracky

3:00 PM
Coffee Break
3:15 PM
Adam Pennington

Surprise title - don't miss out!

4:15 PM
Katie Paxton-Fear

I’m an API Hacker and Here’s How I Hack Everything from the Military to AI

Technical Track

8:00 AM
Registration
Grand Ballroom Foyer
9:15 AM
Sunlight on the Shadow Workers: Hunting State-Sponsored Corporate Espionage
Will Baggett
10:00 AM
Risky Business: Identity Protection Traps When Pentesting Entra ID Environments
Scott Thomas
10:45 AM
Coffee Break
11:00 AM
Digital Identity: Finding the Golden Mean
Kendra Okonski
11:45 AM
PSA - Family Cybersecurity: Special Guest
Ian Thornton-Trump
12:30 PM
Lunch Break
1:30 PM
Securing the Cloud: Understanding Threats and Building Resilience in SaaS Environments
Nicole Morris
2:30 PM
AI's Achilles' Heel: Why Trusting Your Agents Starts With Securing Their NHIs
Michael Silva
3:15 PM
Coffee Break
3:30 PM
Harbouring Hackers
Charles Bain
4:15 PM
The 80/20 Fix: TPRM That Works Even When Your Vendors Don’t
Rob Wood

Compliance Track

8:00 AM
Registration
Grand Ballroom Foyer
9:15 AM
Demystifying GRC for AI Integration
Daniel Powery
10:15 AM
Coffee Break
10:30 AM
Privacy and Cybersecurity: A Love Story (With Plot Twists) of Data's Dynamic Duo
Michael Castro
11:15 AM
Beyond the Checkbox: How to Actually Manage Vendor Risk
Paul Ihme
12:00 PM
Lunch
1:00 PM
Maritime Security
Jeff Ames
1:45 PM
The Hidden Threat in Every Click
Neha Vijay
2:30 PM
To Scan or Not to Scan? That Just Might Be Quishing
Angus Chen
3:15 PM
Coffee Break
3:30 PM
Managed Services: Why They Fail and Who Is Responsible
Garry Coldwells
4:15 PM
AI, Ethics, and the Cayman Islands DPA: Building Trust in the Age of Automation
Adriana Winkler