• Tuesday, August 6
  • Bestsellers in the Underground Economy - Measuring Malware Popularity by Forum

    Winnona DeSombre
    Tue, 11:30 - 11:55
    Proving Ground
  • Examining DES-based Cipher Suite Support within the TLS Ecosystem

    Vanessa Frost
    Tue, 12:00 - 12:25
    Proving Ground
  • Satellite Vulnerabilities 101

    Elizabeth Wilson
    Tue, 14:00 - 14:25
    Proving Ground
  • Analyzing user decision making on phishing sites - using mouse data and keyboard dynamics

    Sanne Maasakkers
    Tue, 14:30 - 14:55
    Proving Ground
  • Broken Arrow: applying InfoSec and Forensic practices to escape domestic abuse

    Will Baggett
    Tue, 15:00 - 15:25
    Proving Ground
  • The Human API: Evolving End Users From Authorized Adversaries Into Our Best Defense.

    Ty Atkin
    Tue, 15:30 - 15:55
    Proving Ground
  • Burpsuite Team Server - Collaborative Web Pwnage

    Tanner Barnes
    Tue, 17:00 - 17:25
    Proving Ground
  • The Resilient Hacker: Growth Mindset, Health Hacks & Powerful Help to Navigate Personal Challenges

    Serenity Smile
    Tue, 17:30 - 17:55
    Proving Ground
  • So you think you can CHMOD

    Jared Chandler
    Tue, 18:00 - 18:25
    Proving Ground
  • Building the badge- How you can make small, cheap and custom hardware for function or fashion

    James Dietle
    Tue, 18:30 - 18:55
    Proving Ground
  • Salesforce Data Governance What dark secrets lurk in your instance??

    Pete Thurston
    Tue, 19:00 - 19:25
    Proving Ground
  • Wednesday, August 7
  • Making your website vulnerable for fun and security awareness

    Kenny Jansson
    Wed, 10:00 - 10:25
    Proving Ground
  • Human Honeypots or: How I Learned to Stop Worrying and Love the Implant

    Nick Koch
    Wed, 10:30 - 10:55
    Proving Ground
  • The struggles of teaching automation

    Joe O’Connell
    Wed, 11:00 - 11:25
    Proving Ground
  • The SOC Counter ATT&CK

    Mathieu Saulnier
    Wed, 11:30 - 11:55
    Proving Ground
  • The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage

    Vanessa Redman
    Wed, 12:00 - 12:25
    Proving Ground
  • I’m a hunter! But what does that mean?

    Yasmine Johnston-Ison
    Wed, 14:00 - 14:25
    Proving Ground
  • Breaking the Bodyguards

    Chrissy Morgan
    Wed, 14:30 - 14:55
    Proving Ground
  • Cover Your A**

    Suchi Pahi
    Wed, 15:00 - 15:25
    Proving Ground
  • Cyber Deception after Detection: Safe observation environment using Software Defined Networking

    TORU SHIMANAKA
    Wed, 15:30 - 15:55
    Proving Ground
  • Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes

    Anna Skelton
    Wed, 17:00 - 17:25
    Proving Ground
  • Baited Canaries - Monitoring attackers with active beacons

    Gregory Caswell
    Wed, 17:30 - 17:55
    Proving Ground
  • Securing Fast (and Furious) DevOps pipelines

    Abdessamad TEMMAR
    Wed, 18:00 - 18:25
    Proving Ground
  • Please inject me, a x64 code injection

    Alon Weinberg
    Wed, 18:30 - 18:55
    Proving Ground