Effective Monitoring for Operational Security
Plight at the end of the Tunnel
Threat Hunting with ELK
Cloud Busting: Understanding Cloud-Based Digital Forensics
Rise of the Miners
Malware Analysis and Automation using Binary Ninja
Keynote - Between a SOC and a Hard Place Panel
Using Atomic Red Team to Test Endpoint Solutions
Exercise Your SOC: How to run an effective SOC response simulation
Adding Simulated Users to Your Pentesting Lab with PowerShell
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Closing Ceremony