• Tuesday, August 7
  • Social engineering at scale, for fun

    Sara Jayne Terp
    Tue, 14:00 - 14:25
    Proving Ground
  • Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement

    Courtney K
    Tue, 14:30 - 14:55
    Proving Ground
  • Building A Teaching / Improvement Focused SOC

    Andrew Gish-Johnson
    Tue, 15:00 - 15:25
    Proving Ground
  • Modern Political Warfare: A Look at Strategy and TTPs

    Sina Kashefipour
    Tue, 15:30 - 15:55
    Proving Ground
  • Legendary Defender - The Voltron Analogy

    Brian Carey
    Tue, 17:00 - 17:25
    Proving Ground
  • Not your Grandpa's Password Policy

    Kevin T Neely
    Tue, 17:30 - 17:55
    Proving Ground
  • Vulnerability Management 101: Practical Experience and Recommendations

    Eric Bryan
    Tue, 18:00 - 18:25
    Proving Ground
  • What is Agile and how can I use it well?

    Nicole Schwartz
    Tue, 18:30 - 18:55
    Proving Ground
  • Wednesday, August 8
  • Cruising the MJ Freeway: Examining a large breach in legal Cannabis

    Rex
    Wed, 14:00 - 14:25
    Proving Ground
  • Unifying the Kill Chain

    Paul Pols
    Wed, 14:30 - 14:55
    Proving Ground
  • Incorporating Human Intelligence (HUMINT) into An Information Security Team

    Aamil Karimi
    Wed, 15:00 - 15:25
    Proving Ground
  • Disabling Encryption to Access Confidential Data

    Christopher Simon Hanlon
    Wed, 15:30 - 15:55
    Proving Ground
  • Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and a bit of Guile

    Michael Aguilar
    Wed, 17:00 - 17:25
    Proving Ground
  • Firmware Security 101

    Arpita Biswas
    Wed, 17:30 - 17:55
    Proving Ground
  • The current state of adversarial machine learning

    Heather Lawrence
    Wed, 18:00 - 18:25
    Proving Ground
  • Treble or Trouble: Where Android's latest security enhancements help, and where they fail

    Tamir Zahavi-Brunner
    Wed, 18:30 - 18:55
    Proving Ground