Building Blocks Essentials: The How-To’s and Why’s of SOC Security Analysis
DEFEND AND CONQUER CTF
AM KEYNOTE - RON GULA
So you want to be a "Cyber Threat Analyst" eh?
Vehicle Forensics
"Humans, right?" Soft Skills in Security
0 to 31337 Real Quick: Lessons Learned by Reversing the Flare-On Challenge
AM HIRING CORNER
Panel | Local Community Cyber Groups in NoVA
Using Software Defined Radio for IoT Analysis
Finding a Companies BreakPoint
Networking with Humans to Create a Culture of Security
Malware Analysis 101
Imposter Syndrome: I Don't Feel Like Who You Think I Am.
Challenges and Opportunities: Application Containers and Microservices
PM KEYNOTE - TARAH WHEELER
Cyber Hunt Challenge – Develop and Test your Threat Hunting skills with Darryl Taylor from LogicHub
How the Smart-City becomes stupid
Why the NTP Security Problem Is Worse than You Think
PM HIRING CORNER
Bro, I Can See You Moving Laterally
Anti-Virus & Firewall Bypass Techniques BY Candan BÖLÜKBAS
Forensics 101
Won’t Get Fooled Again: The expected future of IoT malware and what to do about it.
Panel | Parlaying Education and Experience into an Infosec Career
I'm Cuckoo for Malware: Cuckoo Sandbox and Dynamic Malware Analysis
Software Supply Chains and the Illusion of Control
Panel | Local Accelerators/Incubators
Doomsday Preppers: Fortifying Your Red Team Infrastructure
Sponsor Presentation to CTF Champion & Finalist
CLOSING KEYNOTE - GEORGIA WEIDMAN
ENTREPRENEURSHIP IN CYBER PANEL