Adding Simulated Users to Your Pentesting Lab with PowerShell
An Open Source Malware Classifier and Dataset
Basic Offensive Application of MOF Files in WMI Scripting
Binary Reverse Engineering for Beginners
Breaking and Entering: Lessons Learned from a Federal Penetration Tester
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Closing Ceremony
Cloud Busting: Understanding Cloud-Based Digital Forensics
Counting Down to Skynet
Effective Monitoring for Operational Security
Exercise Your SOC: How to run an effective SOC response simulation
FailTime: Failing towards Success
Hiring Village
How we reverse engineered OSX/Pirrit, got legal threats and survived
Internet Anarchy & The Global March toward Data Localization
Keynote
Keynote - Between a SOC and a Hard Place Panel
Malware Analysis and Automation using Binary Ninja
Plight at the end of the Tunnel
Powershell Deobfuscation: Putting the toothpaste back in the tube
Preparing for Incident Handling and Response within Industrial Control Networks
Quantify your hunt: not your parents’ red teaming
Rise of the Miners
Threat Activity Attribution: Differentiating the Who from the How
Threat Hunting with ELK
TItle: Getting Saucy with APFS! - The State of Apple’s New File System
To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars
Traffic Analysis Workshop 2018
Using Atomic Red Team to Test Endpoint Solutions