• A
  • Adding Simulated Users to Your Pentesting Lab with PowerShell

    Barrett Adams, Chris Myers
    Sun, 15:00 - 15:50
    Track 1
  • An Open Source Malware Classifier and Dataset

    Phil Roth
    Sat, 14:00 - 14:50
    Track 2
  • B
  • Basic Offensive Application of MOF Files in WMI Scripting

    Devon Bordonaro, Connor Gephart, Sam Ruthenberg
    Sat, 14:00 - 14:20
    Track 1
  • Binary Reverse Engineering for Beginners

    Ben Demick, Dennis Rembert III
    Sat, 10:00 - 17:20
    Training 2
  • Breaking and Entering: Lessons Learned from a Federal Penetration Tester

    Joseph Misher
    Sat, 16:00 - 16:50
    Track 2
  • Building a Predictive Pipeline to Rapidly Detect Phishing Domains

    Wes Connell
    Sun, 15:00 - 15:50
    Track 2
  • C
  • Closing Ceremony

     
    Sun, 16:00 - 17:00
    Track 1
  • Cloud Busting: Understanding Cloud-Based Digital Forensics

    Kerry Hazelton, Tigran Terpandjian
    Sun, 10:00 - 17:00
    Training 2
  • Counting Down to Skynet

    Nolan Hedglin
    Sat, 14:30 - 14:50
    Track 1
  • E
  • Effective Monitoring for Operational Security

    Ryan St. Germain, Russell Mosley
    Sun, 10:00 - 10:20
    Track 1
  • Exercise Your SOC: How to run an effective SOC response simulation

    Brian Andrzejewski
    Sun, 14:00 - 14:50
    Track 2
  • F
  • FailTime: Failing towards Success

    Sean Metcalf
    Sat, 12:00 - 12:50
    Track 1
  • H
  • Hiring Village

     
    Sat, 10:00 - 17:20
    Warfields
  • How we reverse engineered OSX/Pirrit, got legal threats and survived

    Amit Serper
    Sat, 15:00 - 15:50
    Track 1
  • I
  • Internet Anarchy & The Global March toward Data Localization

    Andrea Little Limbago
    Sat, 17:00 - 17:20
    Track 1
  • K
  • Keynote

    Jessica Payne
    Sat, 10:00 - 11:00
    Track 1
  • Keynote - Between a SOC and a Hard Place Panel

    James Callahan, Andrew Marini, Dustin Shirley, Shawn Thomas
    Sun, 12:00 - 13:00
    Track 1
  • M
  • Malware Analysis and Automation using Binary Ninja

    Erika Noerenberg
    Sun, 10:30 - 11:20
    Track 2
  • P
  • Plight at the end of the Tunnel

    Anjum Ahuja
    Sun, 10:00 - 10:20
    Track 2
  • Powershell Deobfuscation: Putting the toothpaste back in the tube

    Daniel Grant
    Sat, 17:00 - 17:20
    Track 2
  • Preparing for Incident Handling and Response within Industrial Control Networks

    Mark Stacey
    Sat, 11:30 - 11:50
    Track 2
  • Q
  • Quantify your hunt: not your parents’ red teaming

    Devon Kerr, Roberto Rodriquez
    Sat, 16:00 - 16:50
    Track 1
  • R
  • Rise of the Miners

    Josh Grunzweig
    Sun, 10:30 - 11:20
    Track 1
  • T
  • Threat Activity Attribution: Differentiating the Who from the How

    Joe Slowik
    Sat, 15:00 - 15:50
    Track 2
  • Threat Hunting with ELK

    Ben Hughes, Liana Parakesyan, Peter Quach
    Sun, 10:00 - 17:00
    Training 1
  • TItle: Getting Saucy with APFS! - The State of Apple’s New File System

    Sarah Edwards
    Sat, 12:00 - 12:50
    Track 2
  • To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars

    Lieutenant Colonel Ernest Wong
    Sat, 11:30 - 11:50
    Track 1
  • Traffic Analysis Workshop 2018

    Brad Duncan
    Sat, 10:00 - 17:20
    Training 1
  • U
  • Using Atomic Red Team to Test Endpoint Solutions

    Adam Mathis
    Sun, 14:00 - 14:50
    Track 1