| 08:30 - 08:50 |
Opening |
|
| 09:00 - 09:50 |
Lesley Carhart - Keynote |
|
| 10:00 - 10:50 |
Investigating Windows Endpoints With Free Tools |
Intro to VX (or How to Write a Virus Without Getting on the News) |
| 11:00 - 11:50 |
Beating the Blue Team Budget Blues |
NetflOSINT: taking an often-overlooked data source and operationalizing it |
| 12:00 - 01:30 |
Lunch |
|
| 01:30 - 01:55 |
So you too want to be a company shill |
Listening To the City, a Different Approach To War Driving |
| 02:00 - 02:50 |
Securing Virtual Infrastructure |
Computer Forensics Case Files |
| 03:00 - 03:50 |
Getting Started with Windows Implant Development |
Kubernetes Software Supply Kill Chains |
| 04:00 - 04:50 |
Leverage OpenZiti To Embed Zero Trust |
10 things we learned from 10,000 Cybersecurity Job Postings. |
| 05:00 - 05:30 |
Closing |
|