• Saturday, April 28
  • Preparing for Incident Handling and Response within Industrial Control Networks

    Mark Stacey
    Sat, 11:30 - 11:50
    Track 2
  • TItle: Getting Saucy with APFS! - The State of Apple’s New File System

    Sarah Edwards
    Sat, 12:00 - 12:50
    Track 2
  • An Open Source Malware Classifier and Dataset

    Phil Roth
    Sat, 14:00 - 14:50
    Track 2
  • Threat Activity Attribution: Differentiating the Who from the How

    Joe Slowik
    Sat, 15:00 - 15:50
    Track 2
  • Breaking and Entering: Lessons Learned from a Federal Penetration Tester

    Joseph Misher
    Sat, 16:00 - 16:50
    Track 2
  • Powershell Deobfuscation: Putting the toothpaste back in the tube

    Daniel Grant
    Sat, 17:00 - 17:20
    Track 2
  • Sunday, April 29
  • Plight at the end of the Tunnel

    Anjum Ahuja
    Sun, 10:00 - 10:20
    Track 2
  • Malware Analysis and Automation using Binary Ninja

    Erika Noerenberg
    Sun, 10:30 - 11:20
    Track 2
  • Exercise Your SOC: How to run an effective SOC response simulation

    Brian Andrzejewski
    Sun, 14:00 - 14:50
    Track 2
  • Building a Predictive Pipeline to Rapidly Detect Phishing Domains

    Wes Connell
    Sun, 15:00 - 15:50
    Track 2