Ron Gula, President and Co-Founder of Gula Tech Adventures
SPEAKER | COMPANY | TALK |
TIMES (ET) |
TBC | SCYTHE |
MORNING SESSION: Event Kickoff & Welcome Focus: Introduction to UniCon 2025 |
10: 00 AM - 10:10 AM |
Ron Gula |
President and Co-Founder of Gula Tech Adventures |
Keynote: Strategic Insights on Evolving Cyber Threats and Defensive Postures |
10: 10 AM - 11:00 AM |
Sounil Yu |
CTO at Knostic IANS Faculty |
Debunking AI: The Real vs Hyped Impact on Security Focus: AI/LLM's evolving role in cybersecurity - where it helps and where it falls short. |
11:05 AM - 11:45 AM |
Jackson Wells |
Breach and Attack Simulation Lead at Toyota
|
Building an Autonomous BAS Program Focus: How security teams can merge automation with breach and attack simulation (BAS) for stronger defenses. |
11:50 AM - 12:40 PM |
BREAK | 12:40 - 12:50 PM | ||
Ian Anderson | Director of Enterprise Security at OG&E |
Cyber Resilience Readiness: Lessons from the Field Focus: Red vs Blue hybrid exercises, bridging simulations and tabletop drills for better cyber readiness. |
12:50 PM - 1.30 PM |
Bryson Bort | Founder & CEO of SCYTHE |
Building Effective CTEM Programs Focus: Continuous Threat Exposure Management (CTEM) and how to measure and close security gaps |
1:35 PM - 2:15 PM |
BREAK | 2:15 PM - 2.30 PM | ||
DEMO By Picnic | |||
Tricia Schulz | Section Head, Resilient Cyber Physical Systems at Oak Ridge National Laboratory |
Securing Critical Infrastructure: Why Technology Isn’t Enough Focus: Practical experience and lessons learned from building the Southeast Region Cybersecurity Collaboration Center |
2:30 PM - 3.10 PM |
Panel: Moderator: Jim Webster
|
Leadership in Cybersecurity: A CISO Roundtable Focus: Insights from top CISOs on leadership, risk management, and navigating today's cyber challenges |
3:15 PM - 3:55 PM | |
Danny Akacki | Client Security Strategy Director at Coalfire | Closing Session: Cybersecurity Game Show A fun interactive cybersecurity challenge to wrap up UniCon 2025! |
4:00 PM - 4:30 PM |
Event Ends | 4:30 PM |
Learn the basics and use Command and Control (C2)
Consume Cyber Threat Intelligence from a known adversary
Extract adversary behaviors/TTPs and map to MITRE ATT&CK
Play the Red Team by creating and executing adversary emulation plans
Emulate the adversary behaviors in a small environment consisting of a domain controller, member server, and a Linux system
Play the role of the Blue Team and look for Indicators of Compromise and Behaviors
Use Wireshark to identify heartbeat and jitter
Enable Sysmon configurations to detect adversary behavior
Have FUN!