• Tuesday, August 6
  • Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach

    Pablo Breuer, Sara Jayne Terp
    Tue, 11:30 - 12:25
    Ground Truth
  • Building an enterprise security knowledge graph to fuel better decisions, faster

    Jon Hawes
    Tue, 14:00 - 14:55
    Ground Truth
  • Grapl - A Graph Platform for Detection and Response

    Colin OBrien
    Tue, 15:00 - 15:55
    Ground Truth
  • Profiling User Risk: Borrowing from Business Intelligence to Understand the Security of Your Userbase

    Emily Austin
    Tue, 17:00 - 17:55
    Ground Truth
  • Reducing Inactionable Alerts via Policy Layer

    John Seymour
    Tue, 18:00 - 18:25
    Ground Truth
  • Trying (Unsuccessfully) to Make Meterpreter into an Adversarial Example

    Andy Applebaum
    Tue, 18:30 - 18:55
    Ground Truth
  • Evaluating Code Embeddings

    Rob Brandon
    Tue, 19:00 - 19:25
    Ground Truth
  • Wednesday, August 7
  • Security data science -- Getting the fundamentals right

    Richard Harang
    Wed, 10:00 - 10:55
    Ground Truth
  • Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection

    Veronica Weiss
    Wed, 11:00 - 11:55
    Ground Truth
  • Old things are new again: efficient automatic signature generation for malware classification

    Hyrum Anderson
    Wed, 12:00 - 12:25
    Ground Truth
  • Reduce, Reuse and Recycle ML models - and the security powers is yours

    Ram Shankar Siva Kumar
    Wed, 14:00 - 14:55
    Ground Truth
  • Scheming with Machines: Using ML to Support Offensive Teams

    Nick Landers, Will Pearce
    Wed, 15:00 - 15:55
    Ground Truth
  • Birthday Hunting

    Jack Burgess
    Wed, 17:00 - 17:25
    Ground Truth
  • All that glitters isn't Chrome: Hunting for suspicious browser extensions

    Mike Sconzo
    Wed, 17:30 - 17:55
    Ground Truth
  • Scratching the Surface of Risk

    Wade Baker, Benjamin Edwards
    Wed, 18:00 - 18:55
    Ground Truth