Agenda

April 7, 2025
Workshop
1:00 pm - 5:00 pm

TLP RED: Leveraging Open Source Intelligence (OSINT) for Real-World Threats – Advanced OSINT Training and Workshop

Join RH-ISAC's celebrated OSINT experts in an advanced open source intelligence collections and analysis crash course. The OSINT workshop is designed to equip RH-ISAC members with the skills and knowledge necessary to effectively gather, analyze, and utilize open-source intelligence (OSINT) for various applications, including cy...
Session Page
Networking Event
4:30 pm - 5:00 pm

First-Time Attendee Kick-Off Reception

Welcome to the 2025 RH-ISAC Cyber Intelligence Summit! We're glad you're joining us in St. Louis! As a first-time attendee, come early for the Welcome Reception to mix and mingle with some of the RH-ISAC's Summit Working Group, Board of Directors, Speakers, and other long-time attendees and friends of the RH-ISAC. Meet some fell...
Session Page
Networking Event
5:00 pm - 7:00 pm

Welcome Reception

Welcome to the 2025 RH-ISAC Cyber Intelligence Summit! Say hello to old friends, meet new peers, and help kick off the 2025 conference on the top of the Hyatt Regency St. Louis at the Arch! Open to all RH-ISAC Summit attendees. No additional registration is required....
Session Page
Networking Event
7:00 pm - 10:00 pm

Private | CISO Dinner

The RH-ISAC CISO Dinner is an invite-only event for select CISOs and special guests of the 2025 RH-ISAC Summit.
Session Page
April 8, 2025
Keynote
8:45 am - 9:45 am

Opening Remarks & Keynote: Leading with Expertise: CISOs as Champions of Resilience

Welcome to the RH-ISAC Summit! We're thrilled to kick-off the conference with a panel that seeks to celebrate the expertise of CISOs while underscoring the importance of humility and teamwork in building a resilient cybersecurity posture. Panelists will share personal stories and insights to inspire peers and aspiring leaders. ...
Session Page
Networking Event
9:45 am - 10:15 am

Kickstart Conversations – An Interactive Ice Breaker

Networking doesn’t have to be awkward! We’re gearing up for two full days together, so use this session to kickstart meaningful conversations and build new connections in this interactive session featuring ‘Get to Know You Bingo’. Designed to break the ice and spark engaging discussions, this activity encourages particip...
Session Page
Strategic
10:45 am - 11:30 am

Leaner & Meaner: Driving Efficiency with a Smaller Team

This panel of restaurant cybersecurity leaders will discuss strategies major restaurant brands use to build lean programs and teams. Participants will explore how to build resilient, disciplined, and efficient organizations under budget constraints and explore streamlining architecture, technology selection, and robust capabilit...
Session Page
Tactical
10:45 am - 11:30 am

Honey, I Shrunk the Threats: Automating IOC Workflows

A long-term goal for Kontoor’s Cyber Defense team has been to automate rote, mundane tasks performed manually to give us more time to do the meat of incident response and threat hunting. We are proud to share our most current success to-date for automation with the RH-ISAC Community.  This presentation will show the journe...
Session Page
Operational
10:45 am - 11:30 am

ATO and Beyond: Top 10 Digital Commerce Account Risks & How to Mitigate Them

Everyone knows now that hackers don't break in, they log in. Identity and authentication have gone from being security solutions, to a source of security problems. While the problem is clear most don't know how this happens and what to do about it. This talk explores the most common and painful risks, attack tactics, tools like ...
Sponsored By: IANS Research
Session Page
Operational
10:45 am - 11:30 am

How Security Researchers Help REI Avoid Breaches

In the first quarter of 2023, 16 cyber breaches affected 170,000 retail victims. According to this year’s Hacker-Powered Security Report, retail organizations have seen a 42% rise in verified vulnerabilities, a significant leap compared to the broader industry's increase of 12%. This fireside chat between HackerOne and REI wi...
Sponsored By: HackerOne
Session Page
Private Session
11:45 am - 2:45 pm

Closed-Door CISO Meeting

*SESSION BEGINS AT 11:45 A.M.* Lunch will be provided.  PRIVATE SESSION: Open to CISOs Only. This extended breakout session covers a series of discussion topics selected by the RH-ISAC's CISO Task Force. We'll dive into key challenges and priorities faced by our CISO community. A list of discussion topics will be coming s...
Session Page
Brown Bag Lunch
11:45 am - 12:45 pm

LUNCH: Brown Bag Featured Discussions

Grab a sack lunch and find a group to sit with based on a topic of interest. This casual forum allows for free-flowing discussion with fellow practitioners and peers. We’ll have tables assigned with discussion leaders to facilitate conversation on topics from Working Groups and Security Collaboration Efforts such as: Frau...
Sponsored By: Zscaler
Session Page
Operational
1:00 pm - 1:30 pm

Countering the Threat of DPRK Insider Threats

Recently CISA issued a report on DPRK attempting to infiltrate operatives into United States businesses as contractors. These contractors were specifically targeting remote positions and then multiple individuals within APT units would have access to corporate environments. Some highly sophisticated and some not sophisticated te...
Session Page
Operational
1:00 pm - 1:30 pm

Built-In Exploits: Uncovering the Extent of the Unmanaged xTended Internet of Things

With billions of smart devices in use today, there are now 10 times as many xTended Internet of Things (xIoT) devices in the world than all traditional endpoints combined. Most of these devices – including IoT and OT cyber-physical systems – remain unknown, unmonitored, and unmanaged without basic security hygiene. This crea...
Sponsored By: Phosphorus
Session Page
Tactical
1:00 pm - 1:30 pm

So You’ve Been Named by the FTC…

The FTC recently called out Best Buy as a most abused brand amongst a few others. The presentation will highlight the action Best Buy has taken to reduce brand abuse from both a CTI and business operations perspective. We’ll cover our intelligence processes and techniques for collecting, analyzing and taking action on brand ab...
Session Page
Private Session
1:00 pm - 2:45 pm

Closed-Door CISO Meeting (Cont.)

PRIVATE SESSION: Open to CISOs Only. This extended breakout session covers a series of discussion topics selected by the RH-ISAC's CISO Task Force. We'll dive into key challenges and priorities faced by our CISO community. A list of discussion topics will be coming soon....
Session Page
Operational
2:00 pm - 2:30 pm

Considerations for Securing Gen AI on Corporate Environments

As organizations increasingly integrate Generative AI (Gen AI) into their operations, ensuring the security of these technologies can be challenging. Daniel and Diego will explore the considerations Casey's had to think about when implementing and securing a corporate Gen AI solution.  Attendees will gain insights into best ...
Session Page
Operational
2:00 pm - 2:30 pm

The Ever-Evolving Adversary: Insider Threats, Hactivism and eCrime

Adversaries are increasingly bypassing legacy detection methods, resulting in a 55% rise in interactive intrusions. They're mastering cross-domain attacks – targeting endpoints, identities, and cloud environments – while groups like SCATTERED SPIDER refine their techniques to exploit the cloud.  To effectively stop and d...
Sponsored By: CrowdStrike
Session Page
Private Session
2:00 pm - 2:45 pm

Closed-Door CISO Meeting (Cont.)

PRIVATE SESSION: Open to CISOs Only. This extended breakout session covers a series of discussion topics selected by the RH-ISAC's CISO Task Force. We'll dive into key challenges and priorities faced by our CISO community. A list of discussion topics will be coming soon....
Session Page
Tactical
2:00 pm - 2:30 pm

Advancing MISP for Better Intelligence: Updates, Enhancements, and Community Impact

Over the past year, the RH-ISAC has made significant strides in advancing the usage of MISP for cyber threat intelligence sharing. This session will cover key developments, including upgrading to the latest MISP 2.5 release, enhancements to our enrichment and vetting process, and the introduction of member-vetted indicator tags ...
Session Page
Operational
3:00 pm - 3:45 pm

Unleashing Security Data Power

CISOs need to harness all their security data to quantify risk, articulate efficacy of controls and demonstrate strategic needs for the Board to approve. The problem is that application and database logs, asset and vulnerability data, security telemetry and user identity information are spread over many legacy technologies that ...
Sponsored By: Security Risk Advisors
Session Page
Tactical
3:00 pm - 3:45 pm

TLP RED: A Famous Chollima Event at an Anonymous Member’s Organization

This TLP:RED session is presented by a practitioner from an RH-ISAC member organization who experienced an event attributed to Famous Chollima (AKA UNC5267, Nickel Tapestry, ), a North Korean state-backed threat actor. This threat actor conducts operations to illicitly obtain freelance or full-time IT positions to earn a salary ...
Session Page
Strategic
3:00 pm - 3:45 pm

Harness the Power of NRF’s Fraud Taxonomy

The NRF Retail Fraud Taxonomy is a knowledge base of retail fraud and abuse techniques derived from real-world observations, aimed at enhancing the community's ability to define, understand, prepare for, mitigate, and detect fraud. The Taxonomy provides coverage of fraud behaviors, mitigations, and detections from a wide range o...
Session Page
Tactical
3:00 pm - 3:45 pm

Advancing MISP – Office Hours

Questions about MISP? Sit down with RH-ISAC's Principal Threat Researcher, JJ Josing, for an informal discussion or a deep-dive in the weeds. This office hours-style session is your time to connect with our resident expert on MISP.
Session Page
Operational
3:00 pm - 3:45 pm

Building Resilient Teams: Best Practices for Security Awareness, Effective Content, and Phishing Simulations

This discussion explores best practices for creating and implementing effective security awareness training.  Experts will discuss developing engaging and relevant content, including exploring the role of AI in personalized training.  The panel will also address measuring program effectiveness and identifying key takeaways for...
Session Page
Keynote
4:15 pm - 5:15 pm

How I Would Hack You: Live!

This live demo is one of Tobac’s most sought-after events. We picked a member, someone with a social media presence and a sense of humor, and she will hack them LIVE. Of course, with zero real-world consequences or harm to their social identity or your organization’s cyber security. As she hacks them, Tobac explains, step by...
Session Page
Networking Event
5:15 pm - 6:15 pm

Happy Hour

Celebrate the first day of the RH-ISAC Summit while enjoying light snacks and drinks!
Session Page
Networking Event
6:15 pm - 7:30 pm

Wine Tasting

Unwind after the first day of the RH-ISAC Summit during the Wine Tasting Networking Event, designed to bring together great minds over exceptional wines. This gathering is the perfect setting to expand your network while exploring a curated selection of fine wines. Guided by local expert sommeliers, you’ll discover unique vari...
Sponsored By: IONIX
Session Page
Networking Event
6:15 pm - 7:30 pm

Whiskey Tasting

Help close out the first day of the Summit with some whiskey and great conversation at the RH-ISAC’s inaugural Whiskey Tasting Networking Event. This gathering offers a perfect blend of professional connections and curated whiskey selections. Whether you're a seasoned connoisseur or just whiskey-curious, a local expert guide w...
Sponsored By: Varonis
Session Page
April 9, 2025
Networking Event
7:30 am - 8:15 am

Leveraging Conversations to Build Stronger Relationships: Leadership & Learning Breakfast

Join Joyce Brocaglia, Chief Executive Officer of Executive Women’s Forum, and Linda Dolceamore, Chief Leadership Development Officer of Executive Women’s Forum, for an interactive breakfast session that will elevate your ability to deepen connections and increase trust in relationships through the neuroscience of conversatio...
Session Page
Keynote
8:45 am - 9:45 am

Opening Remarks & Keynote: Staying Ahead: Proactive Cyber Strategies for a Secure Future

In an era where cyber threats evolve faster than ever, organizations must shift from reactive defense to proactive strategy. This keynote will explore the critical steps retail and hospitality businesses can take to anticipate and mitigate threats before they strike. Discover how to harness threat intelligence, implement predict...
Session Page
Tactical
10:00 am - 10:45 am

CTI Writing 101 – Part 1

Lee Clark, the CTI Production Manager for the RH-ISAC, will provide an introduction to strategies and tools for effectively reporting on CTI subjects in an actionable way. Structured as an interactive workshop, Lee’s training will focus on process, structure, focus, and content triage for analysts looking to build or refresh t...
Session Page
Operational
10:00 am - 10:45 am

DIGITAL DECEPTION: Deepfakes – The New Face of Cybercrime (2.0)

Generative AI technology is evolving at an alarming rate, and one of the biggest advancements comes in the form of Deepfakes. Deepfakes, while fun and entertaining, are also transforming the cybercrime ecosystem – enabling fraud, disinformation, and social engineering attacks. This presentation explores the intersection of cyb...
Session Page
Operational
10:00 am - 10:45 am

The ROI of Security Investments: Protecting Global Hospitality Infrastructure at Wyndham Hotels & Resorts

In the fast-paced retail and hospitality industry, customer trust and operational uptime are vital. Discover how Wyndham Hotels & Resorts leverages automated security validation to tackle modern security challenges. Join Jay Mar-Tang, Pentera’s Field CISO, to learn how to prove ROI by reducing critical exposure, cutting co...
Sponsored By: Pentera
Session Page
Strategic
10:00 am - 10:45 am

A Day in the Life of a BISO

This session delves into the crucial role of the Business Information Security Officer (BISO) in today's organizations. We'll explore the unique responsibilities of a BISO, focusing on how they bridge the gap between business objectives and cybersecurity requirements. Effective communication and collaboration will be highlighted...
Session Page
Strategic
11:15 am - 11:45 am

Cyber Risk Quantification: Putting a Price Tag on the Apocalypse

Ever wondered what it costs when the digital world goes up in flames? This presentation dives into Cyber Risk Quantification, where we turn guessing into numbers, chaos into charts, and ask the ultimate question: just how much should we panic? Borrowing a page from the actuaries who quantify everything from car crashes to hurric...
Session Page
Operational
11:15 am - 11:45 am

Threat Intelligence – The Final Puzzle For an Effective Cyber-Program

We are a small team who implemented threat intelligence into our daily cyber security operations. The objective for this presentation is to reinforce the idea that threat intelligence is the final enabler in any cyber security program, not just those with fully staffed Threat Intel Operators. From tactical indicator collection, ...
Session Page
Operational
11:15 am - 11:45 am

Hunting Fake Online Shops

The HUMAN Threat Intelligence and Research team, Satori, has discovered a sophisticated network of websites that advertise themselves as online shops of various commodities, such as clothes, gaming miniatures or books. While the sites seem to be integrated with a third party payment system and able to take payment, the product l...
Sponsored By: HUMAN Security
Session Page
Tactical
11:15 am - 11:45 am

CTI Writing 101 – Part 2

Lee Clark, the CTI Production Manager for the RH-ISAC intelligence team, will provide an introduction to strategies and tools for effectively reporting on CTI subjects in an actionable way. Structured as an interactive workshop, Lee’s training will focus on process, structure, focus, and content triage for analysts looking to ...
Session Page
Keynote
12:15 pm - 1:00 pm

Home Depot’s Soc Transformation Story

This session explores key strategies for a SOC transformation and examines two key aspects of Home Depot’s journey – people and processes. CISO Chris Lanzilotta and Cybersecurity Director Joe Minieri take the stage to share strategies for maximizing impact with the resources you have, talent considerations for internal mobil...
Session Page
Tactical
1:15 pm - 2:00 pm

From Intelligence to Action: CTI-Driven Red Teaming

Attendees of the talk “From Intelligence to Action: CTI-Driven Red Teaming” can expect to gain a comprehensive understanding of how Cyber Threat Intelligence (CTI) can be effectively integrated into red teaming activities. They will learn the basics of CTI, including its components like Indicators of Compromise (IOCs) and Ta...
Session Page
Operational
1:15 pm - 2:00 pm

Constructing Supply Chain Intelligence Programs

This presentation will focus on the ongoing challenges to securing supply chains amid disruptions such as geopolitical upheaval, transportation disruptions, environmental challenges, societal shifts, and cyber threats. It will discuss how to develop an intelligence program that proactively identifies and monitors these uncertain...
Sponsored By: ZeroFox
Session Page
Strategic
1:15 pm - 2:00 pm

ATO for Online Travel Agencies

Since 2023, the hospitality industry has experienced a surge in social engineering campaigns targeting online travel agencies (OTAs) and customer relationship management (CRM) platforms. These attacks range from account takeovers and customer fraud to the deployment of info-stealers, often utilizing fraudulent domains that mimic...
Session Page
Operational
2:15 pm - 2:45 pm

Securing the Retail and Hospitality Industries in the Age of Connected Experiences

The retail and hospitality sectors face a unique set of cyber threats due to their reliance on interconnected systems, the collection of vast amounts of customer data, and the increasing use of technology to enhance customer experiences. This presentation will delve into the specific vulnerabilities and attack vectors targeting ...
Sponsored By: Google Cloud Security
Session Page
Strategic
2:15 pm - 2:45 pm

Las Vegas CISO Group – High-Trust Collaboration Since 2014

In early 2014, the Las Vegas CISO group was formed by CISOs of three major organizations in Las Vegas. They individually spread the word and started forming quarterly in-person meetings with local cyber and IT leaders. The group has consistently met on a quarterly basis ever since, retaining its pure independence, with strict ru...
Session Page
Tactical
2:15 pm - 2:45 pm

Threat Informed Defense is as Easy as 1, 2, 3

The presentation will start with a brief overview of what is and is not threat informed defense (TID). Then it will break down the 3 dimensions of TID - CTI, Defensive Measures, and Test & Evaluation - and how to discreetly measure if your team is doing those dimensions, and to what level. I will then introduce a model, call...
Session Page
Keynote
3:15 pm - 4:15 pm

Your Date with Destiny: Preparing for Your Finest Hour

What if your greatest challenge was actually preparing you for your greatest triumph? Join Captain Christopher Behnam, the pilot who masterfully landed a United Airlines 777 after a catastrophic engine failure over the Pacific, as he shares his harrowing experience and the lessons learned. This powerful keynote delves into the c...
Session Page
Networking Event
4:15 pm - 5:15 pm

Closing Reception & Prize Drawing

Are you feeling lucky? Did you visit the vendor booths and enter for a chance to win some fun prizes? Help us wrap up the Summit and celebrate another great event at the closing reception - with prizes drawn by our illustrious emcee, Luke Vander Linden....
Session Page
Networking Event
6:00 pm - 10:00 pm

Member Meeting & Awards Celebration

Join your RH-ISAC retail and hospitality cybersecurity peers for an evening of celebration. We’re taking over the St. Louis Cardinals’ Ballpark Village Premium Sports bar, Bally Sports Live! This event, sponsored by Google, showcases the milestones we’ve achieved together and honors the 2025 Peer Choice Awards winners.  ...
Session Page