8:30:00 AM |
OPENING SPEECH |
OPENING SPEECH |
9:00:00 AM |
JASON SCOTT |
JASON SCOTT |
9:30:00 AM |
JASON SCOTT |
JASON SCOTT |
10:00:00 AM |
Robert C. Seacord - Jackson Deserialization Vulnerabilities |
Matt Wright - Using Deep Learning to Undermine Tor |
10:30:00 AM |
Robert C. Seacord - Jackson Deserialization Vulnerabilities |
Amber Welch - Data Access Rights Exploits under New Privacy Laws |
11:00:00 AM |
Jeff Man - More Tales From the Crypt…Analyst |
Chloé Messdaghi - How to Fix the Diversity Gap in Cybersecurity |
11:30:00 AM |
Jeff Man - More Tales From the Crypt…Analyst |
Chloé Messdaghi - How to Fix the Diversity Gap in Cybersecurity |
12:00:00 PM |
Francis Lee - Pwning a cheap IP camera for fun, but not profit. |
Frank Fazio - Shock & Awe: Training the Humans |
12:30:00 PM |
Francis Lee - Pwning a cheap IP camera for fun, but not profit. |
Frank Fazio - Shock & Awe: Training the Humans |
01:00:00 PM |
LUNCH |
LUNCH |
01:30:00 PM |
LUNCH |
LUNCH |
02:00:00 PM |
Zach Bevilacqua - Threat Hunting and Other Arcane Magic |
–NO SPEAKER– |
02:30:00 PM |
Zach Bevilacqua - Threat Hunting and Other Arcane Magic |
Hulto - Goofkit - Getting goofy with kernel functions |
03:00:00 PM |
Mark Manning -Kubernetes: DevOps vs “Security People” |
Mike Lisi - What I’ve Learned About Students by Running a CTF |
03:30:00 PM |
Mark Manning -Kubernetes: DevOps vs “Security People” |
Jeff Foley - OWASP Amass: Beyond Subdomain Enumeration |
04:00:00 PM |
Chaim Sanders - Playing the short game: the effects of data breaches on share prices |
Jeff Foley - OWASP Amass: Beyond Subdomain Enumeration |
04:30:00 PM |
Chaim Sanders - Playing the short game: the effects of data breaches on share prices |
Jessica Hyde - Methods for Parsing New Mobile Apps – All about that data |
05:00:00 PM |
Matt Metzger - SMS MFA MITM WTF |
Jessica Hyde - Methods for Parsing New Mobile Apps – All about that data |
05:30:00 PM |
CLOSING OUT |
CLOSING OUT |
06:00:00 PM |
CLOSING OUT |
CLOSING OUT |