〰〰

SCHEDULE

** CONFIRMED DATES & TIMES COMING SOON ** 


Time: TBD | Track: TBD
Adam Shostack
That was close! Learning from our near-misses

Time: TBD | Track: TBD
Alex Parsons
Office 365 Incident Response

Time: TBD | Track: TBD **workshop**
Amiran Alavidze
PowerShell 101 for Blue Teams

Time: TBD | Track: TBD
Anton Goncharov

The Other AI: How Semantic Reasoning Automates Security Data Analysis

Time: TBD | Track: TBD
Barnaby Skeggs
Reverse Engineering Unknown Data Structures for Computer Forensics

Time: TBD | Track: TBD
Bob Fruth
Threat Modeling: Now What?

Time: TBD | Track: TBD
Cariad Keigher
Performing your own dentistry — challenges, unknowns, and what is overlooked in security log collection

Time: TBD | Track: TBD
Duncan Matthew Stirling
What to do before running off to buy fancy shiny products

Time: TBD | Track: TBD
David Reis
Who needs hackers when you've got Tim

Time: TBD | Track: TBD
Derek Armstrong
Live IR on a Budget (of $0)

Time: TBD | Track: TBD
Geoff McDonald
Defrauding the certificate authorities to get trusted code-signing certificates

Time: TBD | Room: TBD | **workshop**
George Pajari
Security Architecture and Engineering 101

Time: TBD | Track: TBD
Greg Foss
PIE - An Active Defense PowerShell Framework to Combat Phishing

Time: TBD | Track: TBD
James Martens
Pitfalls of Data Destruction

 


Time: TBD | Track: TBD
Jeremy Cohoe
Virtualized Network Monitoring for fun and profit

Time: TBD | Room: TBD | **workshop**
Joe Kirwin
A bespoke, artisanal, hand-crafted SELinux workshop

Time: TBD | Track: TBD
John Rauser
Don't Let Cultural Debt Bring Down Your Security Program

Time: TBD | Track: TBD
Justin Berman
Are We Secure?: How To Answer The Unanswerable

Time: TBD | Track: TBD
Ken Westin
White Collars & Black Hats: Bitcoin, Dark Nets and Insider Trading

Time: TBD | Room: TBD | **workshop**
Mohamed Shahat
Attacking the intentionally vulnerable: Boot2Root

Time: TBD | Track: TBD
Nabil Zoldjalali
Autonomous Cyber Defense: AI and the Immune System Approach

Time: TBD | Track: TBD
Raul Alvarez
Malware Research Using OSINT and Open Source Tools: Empowering Everyone

Time: TBD | Track: TBD
Rob Williamson
Adventures in securing the DNS

Time: TBD | Track: TBD
Robert Sell
Exploits in Wetware

Time: TBD | Track: TBD
Robert Wood
Hacking People Development In Cyber Security

Time: TBD | Track: TBD
Stephen Mathezer
Active Directory Security in the Enterprise

Time: TBD | Track: TBD
Tanya Janca
Pushing Left, Like a Boss

Time: TBD | Track: TBD
Wes Connell
Building a Predictive Pipeline to Rapidly Detect Phishing Domains

Time: TBD | Track: TBD
Wesley Wineberg
Hacking the Cloud(s)