Leveraging AI in Cyber Security
Under the Surface of the Optum Big Data Lake
The Stark Reality of Red vs. Blue and Why its Not Working
Remote DFIR Investigations – Introducing the Open Advanced Forensic Examiner
Practical Memory Analysis for Incident Response
Art of Hunting
Creating the Attackers Dilemma: Moving from reactive to proactive defense
Living a Carb[anak] Free Lifestyle
Defeating Detection Mechanisms in Todays Network
Applied Machine Learning: Defeating Modern Malicious Documents
CISO Panel
Building a Usable Mobile Data Protection Strategy
Social Engineers are Jerks. Equipping Your Staff to Deal With Them and Get You in the Loop.
General TSO’s mainframe hackin’
Wrap Up & Door Prize giveaway