09:00 |
Permeh
|
Leveraging AI in Cyber Security |
Casey
|
Under the Surface of the Optum Big Data Lake |
|
10:00 |
Roberts
|
The Stark Reality of Red vs. Blue and Why its Not Working |
Baker
|
Remote DFIR Investigations – Introducing the Open Advanced Forensic Examiner |
|
Cao,
Eikanger
|
Practical Memory Analysis for Incident Response |
|
Eyck,
Frederickson
|
Art of Hunting |
|
11:00 |
Crothers
|
Creating the Attackers Dilemma: Moving from reactive to proactive defense |
Borre,
Schwartz
|
Living a Carb[anak] Free Lifestyle |
|
13:00 |
Kennedy
|
Defeating Detection Mechanisms in Todays Network |
Gaustad
|
Applied Machine Learning: Defeating Modern Malicious Documents |
|
14:00 |
Agostino,
Joyce,
Valente,
Welsh
|
CISO Panel |
Schwartzberg
|
Building a Usable Mobile Data Protection Strategy |
|
15:00 |
Fox
|
Social Engineers are Jerks. Equipping Your Staff to Deal With Them and Get You in the Loop. |
Rikansrud
|
General TSO’s mainframe hackin’ |
|
16:00 | Wrap Up & Door Prize giveaway |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.