Wazuh – Open Source Security for Host and Infrastructure Monitoring 9:00am - 12:00pm
Advanced Wireless Attacks Against Enterprise Networks 1:00pm - 4:00pm
CTF Session 1 9:00am - 12:00pm
CTF Session 2 1:00pm - 4:00pm
Welcome
Keynote by AlienVault 9:00am - 10:00am
After Party featuring Jess Godwin Sponsored by Wazuh and Qualys 6:30pm - 8:00pm
Industrial Control Systems (ICS) - The good, The bad... 10:10am - 11:00am
Vulnerability Hunting on Network Devices 11:10am - 12:00pm
Between You and Me and the Network Security Boundary 1:00pm - 1:50pm
Hackers Interrupted 2:00pm - 2:50pm
Cloudy with a Chance of Persistence: AWS Post Comprom... 3:30pm - 4:20pm
Cashless Society: a Credible Death Threat to Privacy 4:30pm - 5:20pm
Sophisticuffs: The rumble over adversary sophisticati... 5:30pm - 6:20pm
Defending Cyberspace with "Inside-the-Box" Thinking 10:10am - 11:00am
An Employee, their Laptop and a Hacker walk into a Ba... 11:10am - 12:00pm
Herding Purple Squirrels: An Experienced, Whistle-Blo... 1:00pm - 1:50pm
Removing Haystacks to find needles - Playing to our S... 2:00pm - 2:50pm
Murder Mystery – How Vulnerability Intelligence is Po... 3:30pm - 4:20pm
War Stories on Embedded Security: Pentesting, IoT, Bu... 4:30pm - 5:20pm
Passing audits for free with Splunk and RT 5:30pm - 6:20pm
Wait, my wireless is doing WHAT?! 10:10am - 11:00am
Developing a Threat Modeling Mindset 11:10am - 12:00pm
Sucker Punches: Social Engineering Scams and Trends 1:00pm - 1:50pm
"Humans, right?" Soft Skills and Security 2:00pm - 2:50pm
x-ways forensics mother fucker, do you use it? 3:30pm - 4:20pm
Identity Theft Through OSINT/Social engineering 4:30pm - 5:20pm
Reduce the noise - Practical techniques for Threat In... 5:30pm - 6:20pm