• Saturday, October 22
  • Welcome

    Alex Norman, Robert Weiss
    Sat, 09:00 - 09:15
    Grand South - Track 1
  • Keynote

    Marcia Hofmann
    Sat, 09:15 - 10:00
    Grand South - Track 1
  • WCTF Magic as told by a clumsy Magician

    Timothy Allmon
    Sat, 10:30 - 11:20
    Grand South - Track 1
  • Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk

    Gordon MacKay
    Sat, 11:30 - 12:20
    Grand South - Track 1
  • Applying data science to identify malicious actors in enterprise logs

    Balaji Balakrishnan
    Sat, 13:30 - 14:20
    Grand South - Track 1
  • Attacking Patient Health: The Anatomy of Hospital Exploitation

    Jacob Holcomb
    Sat, 14:30 - 15:20
    Grand South - Track 1
  • Adversarial Post-Exploitation: Lessons From The Pros

    Chris Ross, Justin Warner
    Sat, 15:30 - 16:20
    Grand South - Track 1
  • Act and Think like an Epidemiologist to Combat Digital Diseases

    Efrain Ortiz
    Sat, 16:30 - 17:20
    Grand South - Track 1
  • Sunday, October 23
  • We Should Talk About This: Data Security as an Issue for Communication Research

    Claire Tills
    Sun, 09:00 - 09:50
    Grand South - Track 1
  • A Hacker's Guide to Usability Testing

    Greg Norcie
    Sun, 10:30 - 11:20
    Grand South - Track 1
  • Tales from the Crypt...(analyst)

    Jeff Man
    Sun, 12:30 - 13:20
    Grand South - Track 1
  • "Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program

    Jack Johnson
    Sun, 13:30 - 14:20
    Grand South - Track 1
  • A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise

    Joe Klein
    Sun, 14:30 - 15:20
    Grand South - Track 1
  • What's the Big Deal with Assessing ICS/SCADA?

    Jim Gilsinn
    Sun, 15:30 - 16:20
    Grand South - Track 1
  • Closing Remarks

     
    Sun, 16:30 - 17:00
    Grand South - Track 1