| 09:00AM-09:50AM |
Keynote
|
09:00AM-09:50AM |
Keynote
|
| 10:00AM-10:50AM |
Do You Want to Play a Game? How About Disabling Civilization?
|
10:00AM-10:50AM |
How We've Gone Completely Phishing-resistant (And So Can You!)
|
| 11:00AM-11:50AM |
Breaking Into Cybersecurity Without “Experience”
|
11:00AM-11:50AM |
What You Don’t Know Will Cost You: Modern AD Attack Paths and Exploit Chains
|
| 12:00PM-01:30PM |
Lunch
|
12:00PM-01:30PM |
Lunch
|
| 12:00PM-01:55PM |
Reframing the Lens: Expanding Analytical Frames for Faster, Clearer Incident Response
|
12:00PM-01:55PM |
npm should-i-install: Malicious npm packages - Anatomy, Detection gaps and AI's role
|
| 02:00PM-02:50PM |
Testing Security Controls: Do They Detect Behavior or Just File Signatures?
|
02:00PM-02:50PM |
Broken Mirrors Shatter the Soul: A Deep Dive into Kerberos Reflection Attacks and the SPN/DNS Phenomena
|
| 03:00PM-03:50PM |
Evolving Incident Response - IR Triage for Faster Response
|
03:00PM-03:50PM |
Security Misconfigurations in the Cloud - "Oh Look, something fluffy, poke poke poke!"
|
| 04:00PM-04:40PM |
Practice being punched in the face: the reality of breach readiness
|
04:00PM-04:40PM |
A Standard For Investigative Playbooks
|
| 05:00PM-05:30PM |
Red Team Thinking for OPSEC: Why Privacy Fails in Practice
|
05:00PM-05:30PM |
Living Off the Land: Advanced SSH Pivoting, Proxy Chaining, and Reverse Shell Tradecraft
|