OPENING KEYNOTE: The Truth is Out There? Navigating and Exploiting Misinformation and Disinformation in the 21st Century - Chester Wisniewski
Practical Biometric System Hacking - Kevin Chen
The Deception Engine: How Cybercriminals Use AI to Hack Your Perception - Sourabh Aggarwal
Debunking Fake Social Media Profiles Using SOCMINT - Ionatan Waisgluss
The Evolution of Digital Forensics in Brazil: Empowering Federal Prosecution Through Advanced Investigative Techniques - Marcelo Caiado
SBOM Shelter in the Dependency Storm: Building Resilience Brick by Brick - Josh Sokol
Not So Secret: The Hidden Risks of GitHub Actions Secrets - Amiran Alavidze
Malicious Packages - They're Gonna Get Ya! - Megg Sage
Zero Trust in a Post-Truth World: Defending Against Misinformation & Cyber Threats - Femi Ogunji
When All Else Fails: Recovery, Resilience, and the Power of Adaptability - Derran Guinan & Jeremy Carr
AFTERNOON KEYNOTE: One Community, Many Voices: Advancing Cybersecurity Through Collaboration - Mary Carmichael
How to Avoid Potholes When Scaling Your Application Security Program - Jeevan Singh
A Methodology for Quantifying Cyber Risk: The 'R' in GRC Most Are Still Struggling to Define - Kevin Lageweg
Let's Be Honest About Vendor Risk Management: Achieving Real Resilience in Venfor Engagements - Paulo Amaral
Beyond Algorithms: Human Reasoning in Cybersecurity Compliance - Peter Skaronis
From Evidence to Assurance: A Framework for Cybersecurity Through Structured Doubt - Laure Millet
Get to Know Your OAuth Apps: Your New Attack Surface in the Cloud - Mangatas Tondang
Hacking the Machine: Unmasking the Top 10 LLM Vulnerabilities and Real-World Exploits - Reet Kaur
The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune - Jeffrey Gaor
From Junior to Leader: Cultivating Growth in Teams - Noris Buriac
DNS: The Silent Weapon of Cybercriminals - Leveraging DNS, Data and AI/ML to Build Cybersecurity Solutions - Shadid Chowdhury
Boosting Operational Resilience with Red Teaming for OT Systems - Shayne Casavant
Let's Build and AI Red Teamer - Jeff LaPorte
Phish Don't Kill My Vibe: A Practical Guide to Going Passwordless - Noah Stanford
Own Your Value, Master Your Negotiation in Cybersecurity - Aarti Gadhia
fiddleitm: Dynamic Web Threat Analysis with mitmproxy - Jérôme Segura
Scarcity Signals: Are Rare Activities Red Flags? - Darin Smith & John Arneson
Unlocking macOS Internals: A Beginner's Guide to Apple's Open Source Code - Olivia Gallucci
Scanner vs. Senior Script Kiddie - Ali Alame
Secure Cryptographic Architecture Review of Ente Photo Manager - Pushkar Jaltare
Mastering Identity and Access Management Strategy with Entra ID - David Nudelman
Securing AI Agents: Critical Threats & Exploitation Techniques- Naveen Konrajankuppam Mahavishnu and Mohankumar Vengatachalam