• Saturday, June 24
  • Opening Keynote - Bringing the Body's Electrical Signals Out of the Body and Designing Interfaces Therein

    Timothy Marzullo
    Sat, 09:45 - 10:45
    Track 1
  • Know the adversary: Infiltrating Command and Control Comm’s

    Tim Crothers
    Sat, 11:00 - 11:45
    Track 1
  • Burning Down the Haystack: Efficiency Gained with Security Automation & Orchestration

    Ken Schar
    Sat, 12:30 - 13:15
    Track 1
  • Malware Forensics in Minutes

    Jeremiah Cruit
    Sat, 13:30 - 14:15
    Track 1
  • Email is the #1 way we get pwnd

    Michael Gough
    Sat, 14:30 - 15:15
    Track 1
  • Red Team Yourself

    Thomas Richards
    Sat, 15:30 - 16:15
    Track 1
  • Closing Keynote - Social Engineering the News

    Michael Schrenk
    Sat, 16:30 - 17:45
    Track 1
  • Sunday, June 25
  • Cryptography Pitfalls

    John Downey
    Sun, 10:00 - 10:45
    Track 1
  • Out of the Browser into the Fire

    Moloch
    Sun, 11:00 - 11:45
    Track 1
  • Adversary in Depth: Threat Actor TA530

    Rachel Giacobozzi
    Sun, 12:30 - 13:15
    Track 1
  • Threat hunting with Scored network features

    Justin Warner
    Sun, 13:30 - 14:15
    Track 1
  • Closing: Community Round Table Discussion

     
    Sun, 14:30 - 15:15
    Track 1