Thursday - May 14

Sync with the Nolacon ical feed!
TimeSpeaker(s)Title
15:0015:00 Registration Open - Reg Desk Floor 2 - 3-5pm

Friday - May 15

TimeSpeaker(s)Title
09:0009:00 Registration Opens - Reg Desk Floor 2
10:15

Krewe of NolaCon

images/image.jpeg
10:15 NolaCon 2026 Intro and Opening Remarks
10:30

Douglas Hertle

images/image.png

Douglas Hertle brings over 20 years of cybersecurity experience to the stage, along with the dubious distinction of …

10:30 AInternship: The Supervised Intern Model for Enterprise AI and Cybersecurity Operations

Enterprises increasingly rely on AI, but most fail to capture its value. Human analysts drown in billions of log …

11:00

Anthony Hendricks

images/image.png

Anthony Hendricks is a legal problem solver and litigator at Crowe & Dunlevy. At Crowe & Dunlevy, Anthony serves …

11:00 2026 is the New 2016: Relearning the Cyber Lessons from 2016

In 2016, several high-profile data breaches took place, including two Yahoo breaches that affected 1.5 billion user …

12:0012:00 Lunch

A 1 hour lunch break, enjoy the food of New Orleans.

13:00

C.H. Becker

anonymous

C.H. Becker, aka Malate, began as an infosec and hacker hobbyist in the days of dial-up BBSes. This began a lifelong …

13:00 Hacking into the Blue Team and Leadership

The hacker mindset, and the curiosity and skills developed as one driven by such, are most commonly seen as contributing …

14:00

w0mbat

anonymous

Kelsey (w0mbat) is a threat detection and response analyst focused on investigating activity that appears legitimate but …

14:00 It Wasn’t Spoofed: When Authentication Lies

A suspicious email spread internally and was quickly attributed to spoofing. The user whose account was associated with …

15:00

Sno0ose

images/image.png

Brad Ammerman, a leading figure in security testing, currently serves as the Senior Director at Prescient Security. His …

15:00 FORTRESS (Framework for Organized RedTeam and Threat Response Evaluation for Security and Safeguards)

Physical security is a critical component of an organization’s overall cybersecurity strategy. Despite its importance, …

16:00

Bryson Byrd

images/image.png

Bryson Byrd is just a guy–a guy trying to be proud of the one staring back in the mirror through the work he does within …

16:00 Culture Eats Strategy for Breakfast (And Your Security Program for Lunch)

We keep buying tools. We keep writing policies. We keep getting breached. The uncomfortable truth is that …

16:30

Adam S. Roth

images/image.png

Adam has over thirty years of experience in not just cybersecurity but also physical security and surveillance. …

16:30 Ethics in the Kill Chain: Who Governs Cyber Warfare When No One Signed the Treaty?

We have rules for land, sea, air, and space.

Cyberspace? Not so much.

While international humanitarian law applies in …

17:0017:00 Happy Hour with Open Bar

2 Hour open bar for all attendees!!!

Want the bar next to your booth, This sponsorship spot is still open!!! …

Saturday - May 16

TimeSpeaker(s)Title
09:0009:00 Registration Opens - Reg Desk Floor 2
10:0010:00 Keynote
11:00

James Gilkey (Retro)

images/image.png

James Gilkey is an Information Security professional with over a decade in the IT industry, providing services from …

11:00 Pentester's Tools of the Trade

Pentesting doesn’t have to be mysterious. At its core, it’s about understanding systems and knowing which tools are …

12:0012:00 Lunch

A 1 hour lunch break, enjoy the food of New Orleans.

13:00

Matthew Wollenweber

images/IMG_4466.jpeg

Matthew Wollenweber is a security engineer at a late-stage cybersecurity startup. He has over 20 years experience as a …

13:00 Project Mayhem: Defending New Orleans from a Private Spy Network

There are more than 5,000 private spy cameras in New Orleans, operated by a former NOPD officer with zero oversight or …

14:00

Emanuel "Manny" Ohlsen

images/image.png

Emanuel “Manny” Ohlsen is a Principal Consultant specializing in governance architecture, quantified risk modeling, and …

14:00 The Death of the Annual Risk Assessment: Engineering Continuous Governance in the AI Era

For decades, enterprise risk programs have operated on an annual cadence: conduct a risk assessment, update the …

15:00

Evan Kirstein

images/image.png

Evan is a massive nerd, father of 2 boys, and an InfoSec professional in the Finance sector with over 10 years of …


Luke Canfield

images/image.png

Luke Canfield is a cybersecurity analyst focused on vulnerability management, RMF compliance, and OSINT, with over eight …

15:00 The Drone Renaissance 2: #DronesForGood

This session is a maker-friendly blueprint for rapid, community-scale “out-of-band” comms when conventional networks …

16:00

Jae Park

images/image.png

Jae is a Senior Cyber Threat Intelligence analyst with over a decade of experience in the cybersecurity space. He has …

16:00 From Hurricanes to BLIZZARDs: A Perspective on the role of Cyber Threat Intelligence.

Cyber Threat Intelligence (CTI) is often misunderstood by leadership and misapplied by operations. This talk argues that …

16:30

Zach Miller

images/image.png

Zach Miller is a CISSP and security engineer at Bluestaq where the job is keeping large, fast-moving technology stacks …

16:30 LOLMgmt: SCCM to Intune - How the Management Plane Became the Attack Surface Nobody’s Watching

Configuration Manager (SCCM and MECM) manages millions of enterprise endpoints and operates on a core assumption: the …

20:0020:00 NolaCon 2026 Party!

Join us for a great performance by DualCore, and others. And, an Open Bar, of course!!

Where? Conference area of the …

Sunday - May 17

TimeSpeaker(s)Title
10:00

Sanjay Kodukula

images/image.jpg

Sanjay Kodukula is a Senior Cyber Security Engineer at Visa Inc on the M&A Product Security Architecture team. He …


Sandeep Siva

anonymous

I am Sandeep S., a Sr. Security engineer at VISA, where my work focuses on the intersection of cloud security, …

10:00 Securing the AI Supply Chain Before Your Vendors Become Your Weakest Link

Every organization now relies on vendors, and every vendor is racing to bolt AI capabilities onto their platforms. While …

10:30

Mansoor Ahmad

images/ma.jpeg

Mansoor Ahmad is an offensive security professional who has always had a curiosity about how things worked. While in …

10:30 Who Takes the Bait: Understanding phishing susceptibility with practitioner intelligence

Every organization has phishing training, but almost none can answer the question “which roles are actually the …

11:00

Patricia Lee

anonymous

I am an IT management consultant experienced in technical product/project/program creation, management, and …

11:00 Who Watches The Watchmen?

Protecting Personally Identifiable Information (PII) is the intrinsic goal of Governance, Risk, and Compliance (GRC) …

11:30

Deven Chawla

anonymous

Deven Chawla is a Senior Member of Technical Staff at Oracle with over 9 years of experience architecting large-scale, …

11:30 Beyond Human Speed: Building Autonomous, Self Healing Multi Cloud Security Architectures

The scale and velocity of modern multi-cloud environments have surpassed the limits of manual security operations. To …

12:00

Krewe of NolaCon

images/image.jpeg
12:00 NolaCon 2026 Closing Remarks and Awards

Closing Remarks and Awards for 2026

Register Today!