• A
  • Applied Machine Learning: Defeating Modern Malicious Documents

    Evan Gaustad
    Tue, 13:00 - 13:50
    Frostbyte
  • Art of Hunting

    Joseph Ten Eyck, John Frederickson
    Tue, 10:00 - 15:50
    Workshop 2
  • B
  • Building a Usable Mobile Data Protection Strategy

    David Schwartzberg
    Tue, 14:00 - 14:50
    Frostbyte
  • C
  • CISO Panel

    Rich Agostino, Pat Joyce, John Valente, Chris Welsh
    Tue, 14:00 - 14:50
    Snowmageddon
  • Creating the Attackers Dilemma: Moving from reactive to proactive defense

    Tim Crothers
    Tue, 11:00 - 11:50
    Snowmageddon
  • D
  • Defeating Detection Mechanisms in Todays Network

    David Kennedy
    Tue, 13:00 - 13:50
    Snowmageddon
  • G
  • General TSO’s mainframe hackin’

    Chad Rikansrud
    Tue, 15:00 - 15:50
    Frostbyte
  • L
  • Leveraging AI in Cyber Security

    Ryan Permeh
    Tue, 09:00 - 09:50
    Snowmageddon
  • Living a Carb[anak] Free Lifestyle

    Ryan Borre, Michael J. Schwartz
    Tue, 11:00 - 11:50
    Frostbyte
  • P
  • Practical Memory Analysis for Incident Response

    Dan Cao, Ryan Eikanger
    Tue, 10:00 - 15:50
    Workshop 1
  • R
  • Remote DFIR Investigations – Introducing the Open Advanced Forensic Examiner

    Rich Baker
    Tue, 10:00 - 10:50
    Frostbyte
  • S
  • Social Engineers are Jerks. Equipping Your Staff to Deal With Them and Get You in the Loop.

    Jen Fox
    Tue, 15:00 - 15:50
    Snowmageddon
  • T
  • The Stark Reality of Red vs. Blue and Why its Not Working

    Chris Roberts
    Tue, 10:00 - 10:50
    Snowmageddon
  • U
  • Under the Surface of the Optum Big Data Lake

    William Casey
    Tue, 09:00 - 09:50
    Frostbyte
  • W
  • Wrap Up & Door Prize giveaway

     
    Tue, 16:00 - 16:30
    Snowmageddon