• A
  • Abusing Webhooks for Command and Control

    Dimitry Snezhkov
    Wed, 12:00 - 12:25
    Breaking Ground
  • Accessibility: A Creative Solution to Living Life Blind

    Shaf Patel
    Wed, 11:00 - 11:55
    Underground
  • A Day in the Life of a Product Security Incident Response Manager

    Tyler Townes
    Tue, 11:30 - 11:55
    Proving Ground
  • Advanced Wireless Attacks Against Enterprise Networks

    Gabriel Ryan
    Wed, 14:00 - 17:55
    Training Ground
  • All The Sales President’s Men

    Patrick McNeil
    Tue, 17:00 - 17:55
    Common Ground
  • Applied OSINT: Enabling Better Social Engineering for Better Pen Tests

    Joe Gray
    Wed, 10:30 - 10:55
    Proving Ground
  • Ask the EFF

    Nate Cardozo, Eva Galperin, Kurt Opsahl
    Tue, 17:00 - 17:55
    Underground
  • A System Dynamics Approach to CNO Modelling

    Sara Mitchell
    Wed, 11:30 - 11:55
    Ground Truth
  • Auditing Of IoT Devices

    Martin Rakhmanov, Vladimir Zakharevich
    Wed, 14:00 - 17:55
    Training Ground
  • Automating Crypto Bugs Discovery

    Jean-Philippe Aumasson, Yolan Romailler
    Wed, 17:00 - 17:25
    Ground1234!
  • B
  • Baby Got Hack Back

    Leonard Bailey, Jen Ellis, Rob Graham, Davi Ottenheimer
    Wed, 11:00 - 12:25
    Common Ground
  • Banking on Insecurity: The ongoing fairytale of securing financial institutions

    3ncr1pt3d
    Tue, 11:30 - 12:25
    Underground
  • Behavioral Analysis from DNS and Network Traffic

    Josh Pyorre
    Tue, 18:00 - 18:55
    Ground Truth
  • Breaking the Fourth Wall - Hacking a 50 years old myth

    Ayoub Elaassal
    Tue, 15:30 - 15:55
    Proving Ground
  • Building a Benign Data Set

    Rob Brandon, John Seymour
    Wed, 11:00 - 11:25
    Ground Truth
  • C
  • Cash in the aisles: How gift cards are easily exploited

    William Caput
    Tue, 18:00 - 18:55
    Ground1234!
  • CheckPlease - Payload-Agnostic Implant Security

    Brandon Arvanaghi, Christopher Truncer
    Wed, 10:00 - 10:55
    Breaking Ground
  • Crams and Exams for Hams

    Falcon Darkstar Momot
    Wed, 09:00 - 12:25
    Training Ground
  • CTF all the things: Leveraging gamification to up your security game

    Matt Pardo
    Wed, 18:00 - 18:25
    Proving Ground
  • D
  • Data visualization in security: Still home of the WOPR?

    Matthew Park
    Wed, 14:00 - 14:25
    Ground Truth
  • Deep Learning Neural Networks – Our Fun Attempt At Building One

    Ladi Adefala
    Tue, 12:00 - 12:30
    Ground Truth
  • DefCon DarkNet Badge Hardware And Software: An Introduction To Custom Badge Building

    Edward Abrams, CmdC0de, Gater_Byte
    Wed, 15:00 - 15:55
    Common Ground
  • Destructive Malware and Interstate Rivalries: The Evolution of Digital Weapons and Geopolitical Conflict

    Mark Dufresne, Andrea Little Limbago
    Tue, 11:30 - 12:25
    Common Ground
  • E
  • Effective YARA

    Monty St John
    Wed, 08:00 - 17:55
    Training Ground
  • Elastic-ing All the Things - Saving anything at elastic stack and having fun with detections

    Felipe “Pr0teus" Esposito, Rodrigo Montoro
    Tue, 14:00 - 17:55
    Training Ground
  • Engineering My Way Into InfoSec

    Nitha Suresh
    Tue, 17:30 - 17:55
    Proving Ground
  • (
  • (Even More) Mainframes? On my Internet?

    Soldier of FORTRAN
    Wed, 15:00 - 15:55
    Underground
  • E
  • Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation

    Jason Beatty
    Wed, 18:30 - 18:55
    Proving Ground
  • Exploration of Novel Visualizations for Information Security Data

    Roni Choudhury, Brian Wylie
    Wed, 14:30 - 14:55
    Ground Truth
  • Extreme Mobile Application Exploitation

    Sneha Rajguru
    Tue, 14:00 - 17:55
    Training Ground
  • F
  • Feds <3 H4ckers

    Allan Friedman, Suzanne Schwartz, MD, Jessica Wilkerson
    Tue, 15:00 - 15:55
    I Am The Cavalry
  • F! Passwords!

    David M. Zendzian
    Wed, 18:00 - 18:55
    Ground1234!
  • From SOC to CSIRT

    Ben Butz
    Tue, 12:00 - 12:25
    Proving Ground
  • G
  • Getting insight out of and back into deep neural networks

    Richard Harang
    Tue, 14:30 - 15:25
    Ground Truth
  • /
  • /.git/ing All Your Data

    Jesse Kinser
    Wed, 18:00 - 18:25
    Underground
  • G
  • GO Forth And Reverse

    Tim Strazzere
    Tue, 11:30 - 12:25
    Breaking Ground
  • Going Passwordless

    Evan Johnson
    Tue, 19:00 - 19:55
    Ground1234!
  • Google Apps Scripts Kill Chain

    Maor Bin
    Tue, 14:00 - 14:25
    Common Ground
  • Grappling Hooks on the Ivory Tower: This Year in Practical Academic Research

    Falcon Darkstar Momot, Brittany Postnikoff
    Wed, 17:00 - 17:55
    Ground Truth
  • H
  • Hacking College, a Cybersecurity Career, and Certifications

    Marcus J. Carey
    Wed, 14:00 - 14:25
    Hire Ground
  • Hacking Is Easy, Hiring Is Hard: Managing Security People

    Mike Murray
    Wed, 10:00 - 10:55
    Hire Ground
  • Hacking Office Politics for Cybersecurity Leaders

    Caroline Wong, Robert Wood
    Wed, 17:00 - 17:25
    Hire Ground
  • Hacking Tech Interviews

    Adam Brand
    Wed, 11:00 - 11:25
    Hire Ground
  • Hacking the Law: A Call for Action – Bug Bounties Legal Terms as a Case Study

    Amit Elazari
    Tue, 19:30 - 19:55
    Common Ground
  • Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations

    Jeff Toth
    Wed, 17:00 - 17:55
    Common Ground
  • Hadoop Safari : Hunting For Vulnerabilities

    Mahdi Braik, Thomas Debize
    Tue, 15:00 - 15:55
    Common Ground
  • Hands-on OSINT Crash Course for Hackers

    Chris Kubecka
    Tue, 08:00 - 17:55
    Training Ground
  • Healthcare in Critical Condition

    Joshua Corman, Christian Dameff, Jeff Tulley
    Tue, 17:00 - 17:55
    I Am The Cavalry
  • HHS Task Force (Panel)

    Joshua Corman
    Tue, 18:00 - 18:25
    I Am The Cavalry
  • Hidden Hot Battle Lessons of Cold War: All Learning Models Have Flaws, Some Have Casualties

    Davi Ottenheimer
    Tue, 11:30 - 12:00
    Ground Truth
  • How I Scanned The Internet For NSA Compromised Firewalls

    chuck mcauley
    Wed, 18:30 - 18:55
    Underground
  • How To Accidentally Get A Job In InfoSec.

    Johnny Xmas
    Tue, 11:30 - 11:55
    Hire Ground
  • How to escalate privileges to administrator in latest Windows.

    Soya Aoyama
    Tue, 14:00 - 14:25
    Proving Ground
  • How To Hack Recruiting: Turning the Tables (Panel)

    Steve Levy, Pete Radloff, Kris Rides
    Tue, 17:30 - 17:55
    Hire Ground
  • How To Lose Friends and Influence People (An Apology)

    Joshua Corman
    Tue, 10:50 - 11:25
    Keynote
  • How to make metrics and influence people

    Leila Powell
    Wed, 18:00 - 18:55
    Ground Truth
  • How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches

    Yael Basurto, Guillermo Buendia
    Wed, 17:30 - 17:55
    Ground1234!
  • How To Respond To Cops Who Want Your Passwords

    Stephanie Lacambra
    Wed, 18:00 - 18:55
    Common Ground
  • I
  • IATC Closing

     
    Wed, 18:45 - 18:55
    I Am The Cavalry
  • IATC Cyber Crisis Simulation

    Joshua Corman, Jay Healey, Beau Woods
    Wed, 14:00 - 15:55
    I Am The Cavalry
  • IATC Kickoff

    Joshua Corman, Keren Elazari, Beau Woods
    Tue, 11:30 - 12:25
    I Am The Cavalry
  • IATC Mock Congressional Hearing

    Jay Healey, Jessica Wilkerson
    Wed, 17:00 - 18:45
    I Am The Cavalry
  • I Club and So Can You

    Christopher Lamberson
    Tue, 17:00 - 17:25
    Proving Ground
  • I got more games than Milton Bradley: Incentivize a positive change in your security culture

    Drew Rose
    Wed, 14:30 - 14:55
    Proving Ground
  • IMSI Catchers And The Happy Yellow Helicopter: Security Challenges At Standing Rock

    Myron Dewey, Lisha Sterling
    Tue, 14:30 - 14:55
    Common Ground
  • Industrial Control System Network Analysis

    Dennis Murphy
    Tue, 08:00 - 11:55
    Training Ground
  • (
  • (In)Outsider Trading - Hacking stocks using public information and influence.

    Richard Hocking
    Wed, 11:30 - 11:55
    Proving Ground
  • I
  • Inside MormonLeaks: the why, the how, and the what

    Privacy P. Pratt
    Tue, 15:00 - 15:55
    Underground
  • Internet of Cars

    Abe Chen, Chris King, Kevin Tierney
    Tue, 18:30 - 19:25
    I Am The Cavalry
  • Interrogation Techniques for Fun and Profit: Designing better tools for your SOC team

    Karolyn Bachelor
    Wed, 15:00 - 15:25
    Proving Ground
  • Introduction to Reversing and Pwning

    David Weinman
    Tue, 18:00 - 18:25
    Proving Ground
  • Intro to Practical Network Signature Development for Open Source IDS

    Jack Mott, Francis Trudeau, Jason Williams
    Tue, 08:00 - 11:55
    Training Ground
  • Is Data Visualization still necessary?

    Edmond Rogers, Grace Rogers, John Stillwell
    Wed, 15:30 - 16:00
    Ground Truth
  • It’s Not Me, It’s You: How To Be A Better Hiring Manager or Rooting Out Excellent Candidates Despite Themselves

    Andrew Johnson
    Wed, 14:30 - 14:50
    Hire Ground
  • K
  • Kick up the Jams

    Eric Rand
    Wed, 12:00 - 12:25
    Underground
  • Koadic C3 - Windows COM Command & Control Framework

    Aleph _Naught, zerosum0x0
    Tue, 14:00 - 14:55
    Breaking Ground
  • L
  • Lessons from the front lines: New York City Cyber Command

    Colin Ahern
    Wed, 18:00 - 18:55
    Breaking Ground
  • Lightning Talks: Thinking Different

    David Batz, Steven Luczynski, Caroline Wong, Robert Wood
    Wed, 11:00 - 11:55
    I Am The Cavalry
  • M
  • Magical Thinking... and how to thwart it.

    Mara Tam
    Wed, 15:00 - 15:25
    Ground Truth
  • Measuring the Use and Abuse of Brain Wallets

    Ryan Castellucci, Marie Vasek
    Tue, 14:00 - 14:55
    Ground1234!
  • Mentoring, Networking, Resume Review

     
    Tue, 12:30 - 14:25
    Hire Ground
  • Messing with Forensic Analysts: Modifying VSS Snapshots

    James Clawson
    Wed, 15:30 - 15:55
    Proving Ground
  • Microservices And FaaS For Offensive Security

    Ryan Baxendale
    Tue, 17:00 - 17:25
    Breaking Ground
  • Minimum Viable Risk Management Program

    Rachael Lininger
    Wed, 14:00 - 14:55
    Common Ground
  • Mining Software Vulns in SCCM / NIST’s NVD– The Rocky Road to Data Nirvana

    Loren Gordon
    Wed, 10:30 - 10:55
    Ground Truth
  • Modern Internet-Scale Network Reconnaissance

    underflow
    Wed, 15:00 - 15:55
    Breaking Ground
  • N
  • Navigating the Alternative Facts of Malware Prevention

    Rodrigo Brenes, Josh Sokol
    Tue, 14:00 - 14:55
    Underground
  • Network Forensic Analysis in an Encrypted World

    Will Peteroy, Justin Warner
    Wed, 11:00 - 11:55
    Breaking Ground
  • O
  • One OSINT Tool to Rule Them All

    Emilie St-Pierre
    Wed, 11:00 - 11:25
    Proving Ground
  • Optimizations for Bitcoin key cracking

    Ryan Castellucci
    Tue, 11:30 - 12:25
    Ground1234!
  • P
  • Password Cracking 201: Beyond the Basics

    Royce Williams
    Wed, 15:00 - 15:55
    Ground1234!
  • Poking bears: Validating the truth from IoCs in attack postmortem reports

    Andrew Brandt
    Wed, 14:00 - 14:55
    Underground
  • Practical Malware Analysis - Hands-On

    Sam Bowne, Devin Duffy, Dylan James Smith
    Wed, 08:00 - 11:55
    Training Ground
  • Protecting Windows Credentials: An Excessive Guide for Security Professionals

    Mark Burnett
    Wed, 14:00 - 14:55
    Ground1234!
  • Public Policy of Things

    Jessica Wilkerson
    Tue, 14:00 - 14:55
    I Am The Cavalry
  • Purple Team: How This Color Can Help You And Your Organisation Learn and Get Better

    Patrick Mathieu
    Wed, 10:00 - 10:55
    Common Ground
  • Pwn All The Mobile Porn Apps

    Ben Actis
    Tue, 15:00 - 15:25
    Proving Ground
  • Pwning Software-Defined Networking (SDN)

    Tommy Chin
    Tue, 19:00 - 19:25
    Common Ground
  • R
  • Radio frequencies all around us! What data are you leaking and what is done with it?

    Keya Lea Horiuchi
    Wed, 19:00 - 19:25
    Proving Ground
  • Rate the Recruiter

    Ashley Bush, Brian Sheridan
    Tue, 14:30 - 14:55
    Hire Ground
  • Recruiter Smack Down (Panel)

    Matt Duren, Jen Havermann, Steve Levy, Pete Radloff, Kris Rides
    Tue, 18:00 - 18:25
    Hire Ground
  • Red/Blue Q&A: Pressure Test Lightning Talk Ideas

    David Batz, Steven Luczynski, Caroline Wong, Robert Wood
    Wed, 12:00 - 12:25
    I Am The Cavalry
  • Regulatory Nets vs. The Fishing Hook Of Litigation

    Wendy Knox Everette
    Tue, 18:30 - 18:55
    Common Ground
  • Rethinking P@ssw0rd Strength Beyond Brute-force Entropy

    Ross Dickey
    Wed, 12:00 - 12:25
    Ground1234!
  • Robust Defense for the rest of Us

    Russell Mosley
    Wed, 14:00 - 14:25
    Proving Ground
  • S
  • Safer Storage and Handling of User Answers to Security Questions

    Arnold Reinhold
    Wed, 10:00 - 10:55
    Ground1234!
  • Scamming the Scammers - Becoming the Robin Hood of the phones

    Nathan Clark
    Wed, 10:00 - 10:25
    Proving Ground
  • SECSMASH: Using Security Products to own the Enterprise'

    Kevin Dick, Steven Flores
    Wed, 14:00 - 14:55
    Breaking Ground
  • Sex, Secret and God: A Brief History of Bad Passwords

    Kyle Rankin
    Tue, 15:00 - 15:55
    Ground1234!
  • Skip tracing for fun and profit

    Rhett Greenhagen
    Tue, 18:00 - 18:55
    Underground
  • SniffAir – An Open-Source Framework for Wireless Security Assessments

    Steven Darracott, Matthew Eidelberg
    Tue, 18:30 - 18:55
    Breaking Ground
  • Something Wicked: Defensible Social Architecture in the context of Big Data, Behavioral Econ, Bot Hives, and Bad Actors

    Allison Miller
    Tue, 10:00 - 10:45
    Keynote
  • Sympathy for the Developer

    Sarah Gibson
    Tue, 19:00 - 19:30
    Ground Truth
  • T
  • Technical Tactics: Embedded Linux Software BOM

    daniel beard
    Wed, 10:30 - 10:40
    I Am The Cavalry
  • Technical Tactics: Fear & loathing in building management systems

    Edward Farrell
    Wed, 10:45 - 10:55
    I Am The Cavalry
  • The Attack Chain Of A Nation-State (Equation Group)

    Tal Liberman, Omri Misgav
    Tue, 19:00 - 19:25
    Underground
  • The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

    Gabriel Ryan
    Tue, 15:00 - 15:55
    Breaking Ground
  • The Commoditization of Security Solutions: Will You Be Replaced by a Small Script?

    Nathan Sweaney
    Tue, 15:00 - 15:25
    Hire Ground
  • The Human Factor: Why Are We So Bad at Security and Risk Assessment?

    John Nye
    Tue, 17:00 - 17:55
    Ground Truth
  • The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software

    Joshua Saxe
    Wed, 10:00 - 10:25
    Ground Truth
  • The Role of Data Visualization in Improving Machine Learning Models

    Phil Roth
    Wed, 12:00 - 12:30
    Ground Truth
  • The Struggle Is Real: My Journey With Mental Health Issues

    Joel Cardella
    Tue, 18:00 - 18:25
    Common Ground
  • Think Complex Passwords Will Save You?

    Ian Foster, David Hulton
    Tue, 17:00 - 17:55
    Ground1234!
  • TMTO...Y?

    Steve Thomas
    Wed, 11:00 - 11:55
    Ground1234!
  • Transfer Learning: Analyst-Sourcing Behavioral Classification

    Ignacio Arnaldo, Tim Mather
    Tue, 15:30 - 16:00
    Ground Truth
  • Two-Factor Auth - Demand Bidirectional

    Joe Kirwin
    Tue, 14:30 - 14:55
    Proving Ground
  • V
  • Vaccination - An Anti-Honeypot Approach

    Gal Bitensky
    Wed, 17:00 - 17:55
    Breaking Ground
  • W
  • What A Career In Public Service Is Really About

    Bobbie Stempfley
    Tue, 12:00 - 12:25
    Hire Ground
  • Why can't we be friends? (Ask a Fed.)

    Russell Handorf
    Wed, 17:00 - 17:55
    Underground
  • Why is China all up in my SQL server?

    Andrew Brandt
    Wed, 10:00 - 10:55
    Underground
  • Writing Malware Without Writing Code

    Gal Bitensky
    Tue, 19:00 - 19:25
    Breaking Ground
  • Y
  • YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection

    Austin Byers
    Tue, 19:30 - 19:55
    Breaking Ground
  • Your Facts Are Not Safe with Us: Russian Information Operations as Social Engineering

    Meagan Keim
    Wed, 12:00 - 12:25
    Proving Ground
  • Your model isn't that special: zero to malware model in Not Much Code and where the real work lies

    Hyrum Anderson
    Tue, 14:00 - 14:25
    Ground Truth
  • Z
  • Zero Trust Networks: In Theory and in Practice

    Doug Barth, Evan Gilman
    Tue, 17:30 - 18:25
    Breaking Ground