• Saturday, June 16
  • Attacking Authentication in Web Applications

    Jake Miller
    Sat, 09:00 - 10:00
    Moody 101 - Track 4 - In The Weeds
  • Another name for Intel: Honeypots

    Kat Fitzgerald
    Sat, 10:00 - 11:00
    Moody 101 - Track 4 - In The Weeds
  • GSuite Digital Forensics and Incident Response

    Megan Roddie
    Sat, 11:00 - 12:00
    Moody 101 - Track 4 - In The Weeds
  • Achieving Advanced Security Use Cases by Integrating Key Security Solutions with a Vulnerability Management System

    Gunner Clary, Danny Santander
    Sat, 13:00 - 14:00
    Moody 101 - Track 4 - In The Weeds
  • Cryptojacking Servers: The Intersection of poor patch management and ICO's

    Chuck McAuley
    Sat, 14:00 - 15:00
    Moody 101 - Track 4 - In The Weeds
  • Securing the Future of TLS: What's new in TLS 1.3

    Carl Mehner
    Sat, 15:00 - 16:00
    Moody 101 - Track 4 - In The Weeds
  • PowerShell exploitation, PowerSploit, Bloodhound, PowerShellMafia, Obfuscation, PowerShell Empire, the Empire has fallen, you CAN detect PowerShell exploitation

    Michael Gough
    Sat, 16:00 - 17:00
    Moody 101 - Track 4 - In The Weeds