The Schedule
Saturday, September 26
Saturday, September 26
Registration 9:00 - 9:45
10:00-10:30
10:30 - 11:30
Track 2: Resource Smart Detection with YARA and osquery
Track 2: Resource Smart Detection with YARA and osquery
Julian Wayte
11:00 - 11:30
Track 1: Cultivating the Investigative Mindset: Improving critical thinking skills needed for starting or furthering a career in cyber security
Track 1: Cultivating the Investigative Mindset: Improving critical thinking skills needed for starting or furthering a career in cyber security
Ursula Cowan (@ush1c )
11:30 - 12:30
Track 1: Looks (and dogs) can be deceiving: student on student manipulation
Track 1: Looks (and dogs) can be deceiving: student on student manipulation
Rachel Bleiman
11:30 - 12:30
Track 2: The Pentester Blueprint: A Guide to Becoming a Pentester
Track 2: The Pentester Blueprint: A Guide to Becoming a Pentester
Phillip Wylie (@PhillipWylie)
11:30 - 12:30
Track 3: Bug hunting in firmware and hardware at scale: Tools, tips, and some real vulnerabilities
Track 3: Bug hunting in firmware and hardware at scale: Tools, tips, and some real vulnerabilities
Jeff Spielberg (@jspielberg)
Break 12:30 -1:00
1:00 - 2:00
Track 1: The Role of Social Science in Cybersecurity Research and Education
Track 1: The Role of Social Science in Cybersecurity Research and Education
Aunshul Rege (@Prof_Rege)
1:00 - 2:00
Track 2: Digital Separation: Reclaiming your data, post-relationship and implementing risk-based OPSEC
Track 2: Digital Separation: Reclaiming your data, post-relationship and implementing risk-based OPSEC
April Wright (@aprilwright)
1:00 - 2:00
Track 3: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
Track 3: Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
Kaust (@s3curityb3ast)
2:00 - 3:00
Track 1: Cyber Deterrence and Adversary Management: A Decade of Lessons Learned
Track 1: Cyber Deterrence and Adversary Management: A Decade of Lessons Learned
Dr Stanley J Barr
2:00 - 3:00
Village Track: Bobby Pins, More Effective Than Lockpicks?
Village Track: Bobby Pins, More Effective Than Lockpicks?
John the Geek
3:00 - 4:00
Track 1: Everyone Can Play! Building CTFs To Teach Non-Security Folks
Track 1: Everyone Can Play! Building CTFs To Teach Non-Security Folks
Joe Kuemerle (@jkuemerle)
3:00 - 4:00
Track 3: Forgot Password - Finding Missing People Using Login and Password Reset
Track 3: Forgot Password - Finding Missing People Using Login and Password Reset
Chris Kirsch (@chris_kirsch)
3:00 - 3:30
Village Track: Operational Intelligence in a Corporate Environment
Village Track: Operational Intelligence in a Corporate Environment
Helen Negre (@helennegre) & Robert Dare (@bigbrotherdare)
4:00 - 5:00
Track 2: Outbreak! Virus vs. Virus: How We Can Apply Current Legislation and Handling of the COVID-19 Pandemic to the Spread of Malware
Track 2: Outbreak! Virus vs. Virus: How We Can Apply Current Legislation and Handling of the COVID-19 Pandemic to the Spread of Malware
Gabrielle Hempel (@gabsmashh)
4:00 - 5:00
Track 3: Don’t end up with a pencil: Tips for shopping for pen tests
Track 3: Don’t end up with a pencil: Tips for shopping for pen tests
Dmitry Zagadsky (@dzag_)
4:00 - 4:30
Village Track: What Stickers, Donuts, and Listening Can Do for Your ICS Security Program: There is no blinking box coming to save defenders of Industrial Control Systems
Village Track: What Stickers, Donuts, and Listening Can Do for Your ICS Security Program: There is no blinking box coming to save defenders of Industrial Control Systems
Ian Anderson (@ian_infoSec)
5:00 - 6:00
Track 3: The Delicate Art of Tuning Security Tools for DevSecOps
Track 3: The Delicate Art of Tuning Security Tools for DevSecOps
Michael Rossoni (@bytefool) & Emmanuel Hernandez
Discord Open for continued conversations