Applied Machine Learning: Defeating Modern Malicious Documents
Art of Hunting
Building a Usable Mobile Data Protection Strategy
CISO Panel
Creating the Attackers Dilemma: Moving from reactive to proactive defense
Defeating Detection Mechanisms in Todays Network
General TSO’s mainframe hackin’
Leveraging AI in Cyber Security
Living a Carb[anak] Free Lifestyle
Practical Memory Analysis for Incident Response
Remote DFIR Investigations – Introducing the Open Advanced Forensic Examiner
Social Engineers are Jerks. Equipping Your Staff to Deal With Them and Get You in the Loop.
The Stark Reality of Red vs. Blue and Why its Not Working
Under the Surface of the Optum Big Data Lake
Wrap Up & Door Prize giveaway