• A
  • Adversary in Depth: Threat Actor TA530

    Rachel Giacobozzi
    Sun, 12:30 - 13:15
    Track 1
  • B
  • Breaking into Information Security Workshop

    Anthony J. Stieber
    Sun, 09:00 - 15:15
    Classroom C
  • Burning Down the Haystack: Efficiency Gained with Security Automation & Orchestration

    Ken Schar
    Sat, 12:30 - 13:15
    Track 1
  • C
  • Classic CTF

     
    Sat, 11:00 - 16:15
    Classroom C
  • Closing: Community Round Table Discussion

     
    Sun, 14:30 - 15:15
    Track 1
  • Closing Keynote - Social Engineering the News

    Michael Schrenk
    Sat, 16:30 - 17:45
    Track 1
  • Cryptography Pitfalls

    John Downey
    Sun, 10:00 - 10:45
    Track 1
  • Cyber Security Analysis Training (Saturday)

    Leonard Jacobs
    Sat, 11:00 - 16:15
    Classroom A
  • Cyber Security Analysis Training (Sunday)

    Leonard Jacobs
    Sun, 09:00 - 15:15
    Classroom A
  • E
  • Email is the #1 way we get pwnd

    Michael Gough
    Sat, 14:30 - 15:15
    Track 1
  • H
  • Hackers Interrupted

    Alex Holden
    Sat, 11:00 - 11:45
    Track 2
  • How to Dystopia Proof your Data

    Megan Carney
    Sat, 14:30 - 15:15
    Track 2
  • I
  • Incident Response 101

    Michael Gough
    Sun, 09:00 - 15:15
    Classroom B
  • IoT Pentesting Workshop

    Subash Adhikari, Momodou Jaiteh
    Sat, 11:00 - 16:15
    Classroom B
  • J
  • JavaScrypto: How we are using browsers as cryptographic engines

    Kat Traxler
    Sat, 15:30 - 16:15
    Track 2
  • K
  • Kill all the Orcs, Hack all the things

    Chad Walker
    Sun, 10:00 - 10:45
    Track 2
  • Know the adversary: Infiltrating Command and Control Comm’s

    Tim Crothers
    Sat, 11:00 - 11:45
    Track 1
  • M
  • Malware Forensics in Minutes

    Jeremiah Cruit
    Sat, 13:30 - 14:15
    Track 1
  • Murder mystery, How Vulnerable Intelligence is Poising your infosec program

    Gordon MacKay
    Sun, 12:30 - 13:15
    Track 2
  • N
  • Need for Speed, Benefits of speed driven incident response

    Aaron Shanas
    Sun, 13:30 - 14:15
    Track 2
  • Neuro Hacking

    Timothy Marzullo
    Sat, 11:00 - 16:15
    Main Villages
  • O
  • Opening Keynote - Bringing the Body's Electrical Signals Out of the Body and Designing Interfaces Therein

    Timothy Marzullo
    Sat, 09:45 - 10:45
    Track 1
  • Out of the Browser into the Fire

    Moloch
    Sun, 11:00 - 11:45
    Track 1
  • R
  • Red Team Yourself

    Thomas Richards
    Sat, 15:30 - 16:15
    Track 1
  • Remembering how we got here Integrating defense-in-depth into DevOps Culture

    Kasim Esmail, Matt Krieger
    Sat, 12:30 - 13:15
    Track 2
  • S
  • SDR 101 (Saturday)

    Tim Jensen, Mike Saunders
    Sat, 11:00 - 16:15
    SDR / HAM Village
  • SDR 101 (Sunday)

    Tim Jensen, Mike Saunders
    Sun, 10:00 - 14:15
    SDR / HAM Village
  • Security in the land of Microservices

    Jack Mannino
    Sat, 13:30 - 14:15
    Track 2
  • T
  • Threat Hunting for Enterprise

    Joseph Ten Eyck
    Sun, 11:00 - 11:45
    Track 2
  • Threat hunting with Scored network features

    Justin Warner
    Sun, 13:30 - 14:15
    Track 1