Opening Keynote - Bringing the Body's Electrical Signals Out of the Body and Designing Interfaces Therein
Know the adversary: Infiltrating Command and Control Comm’s
Burning Down the Haystack: Efficiency Gained with Security Automation & Orchestration
Malware Forensics in Minutes
Email is the #1 way we get pwnd
Red Team Yourself
Closing Keynote - Social Engineering the News
Cryptography Pitfalls
Out of the Browser into the Fire
Adversary in Depth: Threat Actor TA530
Threat hunting with Scored network features
Closing: Community Round Table Discussion