Keynote
To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars
FailTime: Failing towards Success
Basic Offensive Application of MOF Files in WMI Scripting
Counting Down to Skynet
How we reverse engineered OSX/Pirrit, got legal threats and survived
Quantify your hunt: not your parents’ red teaming
Internet Anarchy & The Global March toward Data Localization
Effective Monitoring for Operational Security
Rise of the Miners
Keynote - Between a SOC and a Hard Place Panel
Using Atomic Red Team to Test Endpoint Solutions
Adding Simulated Users to Your Pentesting Lab with PowerShell
Closing Ceremony