Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Registration and Breakfast 8:00am - 9:00am
Opening Remarks Simulcast 8:45am - 9:00am
Dear Blue Team: Forensics Advice to Supercharge your DFIR capabi... 9:00am - 10:00am
The Many Faces of Emotet: Annoyance or Threat? 10:00am - 11:00am
UNIX: the Other White Meat 11:00am - 12:00pm
Keynote Simulcast 1:00pm - 2:00pm
Building a Bridge to a Legacy Application - How Hard Can that Be... 2:00pm - 3:00pm
Beyond the Buzzwords: How Security Can Use Marketing Concepts to... 3:00pm - 4:00pm
Exploit development for penetration testers 4:00pm - 5:00pm
Find out what happens when 70 universities and 1000 volunteers p... 5:00pm - 6:00pm
Lunch 12:00pm - 1:00pm
Extracting the Attacker: Getting the Bad Guys Off Your SaaS 9:00am - 10:00am
Starting from Scratch: Building a security program from the grou... 10:00am - 11:00am
Talking Cars: from Can't to CAN 11:00am - 12:00pm
Opening Remarks 8:45am - 9:00am
Investigating IPv6 via UPnP 9:00am - 10:00am
The sound of evil 10:00am - 11:00am
Regions are types, types are policy, and other ramblings 11:00am - 12:00pm
What Can League of Legends Teach Us About Cybersecurity? 1:00pm - 2:00pm
Reverse Engineering Small Radios for Compatibility 2:00pm - 3:00pm
The Race to Secure Texas Instruments Graphing Calculators 3:00pm - 4:00pm
Hacker Jeopardy 4:00pm - 6:00pm