• Saturday, February 1
  • Battling Supermutants in the Phishing Wasteland

    Zack Allen, Ashlee Benge
    Sat, 10:00 - 10:50
    Belay It!
  • Command and KubeCTL: Real-World Kubernetes Security for Pentesters

    Mark Manning
    Sat, 11:00 - 11:50
    Belay It!
  • Airplane Mode: Cybersecurity @ 30,000+ Feet

    Olivia Stella
    Sat, 12:00 - 12:50
    Belay It!
  • Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up

    Wendy Knox Everette
    Sat, 14:00 - 14:50
    Belay It!
  • Teen Hacks for Obfuscating Identity on Social Media

    Samantha Mosely, Russell Mosley
    Sat, 15:00 - 15:20
    Belay It!
  • Software Mitigations for Hardware Vulnerabilities

    Antonio Gomez
    Sat, 15:30 - 15:50
    Belay It!
  • SBOM: Screw it, We’ll Do it Live!

    Audie, Joshua Corman
    Sat, 16:00 - 16:20
    Belay It!
  • Security Researcher OPSEC

    Krassimir Tzvetanov
    Sat, 16:30 - 16:50
    Belay It!
  • Anti-Forensics for Fun and Privacy

    Alissa Gilbert
    Sat, 17:00 - 17:50
    Belay It!
  • Sunday, February 2
  • Adversary Detection Pipelines: Finally Making Your Threat Intel Useful

    Xena Olsen
    Sun, 10:00 - 10:50
    Belay It!
  • Real World Zero Trust Implementation

    Mark Loveless
    Sun, 11:00 - 11:50
    Belay It!
  • Project Everest: Fast, Correct, and Secure Software for Deployment Now!

    Jonathan Protzenko, Nikhil Swamy
    Sun, 12:00 - 12:50
    Belay It!