• 08:00
  • Windows Breakout and Privilege Escalation

    Rohan Durve
    Tue, 08:00 - 17:55
    Training Ground
  • Knowing the Unknown: Using PCAP to Break Down Application-Layer Protocols

    David Pearson
    Tue, 08:00 - 11:55
    Training Ground
  • Reverse Engineering Android Apps

    Elizabeth Biddlecome, Sam Bowne
    Tue, 08:00 - 11:55
    Training Ground
  • Malware Traffic Analysis Workshop

    Brad Duncan
    Tue, 08:00 - 17:55
    Training Ground
  • 09:00
  • Professionalization - Possibilities and Potholes

    Andrea Matwyshyn
    Tue, 09:00 - 09:55
    Public Ground
  • 09:30
  • Opening Remarks

     
    Tue, 09:30 - 09:55
    Events
  • Board Communications

     
    Tue, 09:30 - 10:25
    CISO Summit
  • 10:00
  • Keynote with Bob Lord

    Bob Lord
    Tue, 10:00 - 11:25
    Events
  • Reverse Engineering the Cyber Policy API

    Katherine Pratt, Maurice Turner
    Tue, 10:00 - 11:55
    Public Ground
  • 11:00
  • Zero Trust

     
    Tue, 11:00 - 11:55
    CISO Summit
  • 11:30
  • Beginners Session: Lock Picking

     
    Tue, 11:30 - 11:45
    Events
  • BEEMKA / Electron Post-Exploitation When The Land Is Dry

    Pavel Tsakalidis
    Tue, 11:30 - 12:25
    Breaking Ground
  • DLP Sucks and Why You Should Use It

    John Orleans
    Tue, 11:30 - 12:25
    Common Ground
  • SSO Wars: The Token Menace

    Oleksandr Mirosh, Alvaro Munoz
    Tue, 11:30 - 12:25
    Ground1234!
  • Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach

    Pablo Breuer, Sara Jayne Terp
    Tue, 11:30 - 12:25
    Ground Truth
  • Now that you hacked the plane, what are you going to do about your career?

    Chris Roberts
    Tue, 11:30 - 11:55
    HIre Ground
  • I Am The Cavalry Track Welcome and Overview

    Joshua Corman, Beau Woods
    Tue, 11:30 - 11:55
    I Am The Cavalry
  • Bestsellers in the Underground Economy - Measuring Malware Popularity by Forum

    Winnona DeSombre
    Tue, 11:30 - 11:55
    Proving Ground
  • Duck and (Re)Cover - The missing link in the security evolution

    Peter Lidell
    Tue, 11:30 - 12:25
    Underground
  • 12:00
  • Addressing non-linear InfoSec career paths

    Sarah Young
    Tue, 12:00 - 12:25
    HIre Ground
  • Can the CAN bus fly ­Risks of CAN bus networks within avionics systems

    Patrick Kiley
    Tue, 12:00 - 12:25
    I Am The Cavalry
  • Examining DES-based Cipher Suite Support within the TLS Ecosystem

    Vanessa Frost
    Tue, 12:00 - 12:25
    Proving Ground
  • 13:00
  • Supply Chain Security

     
    Tue, 13:00 - 13:55
    CISO Summit
  • 14:00
  • Unpacking pkgs: A look inside macOS Installer packages and common security flaws

    Andy Grant
    Tue, 14:00 - 14:55
    Breaking Ground
  • Where in the world are Carmen's $adjective cyber attacks: The game show that wonders why things aren't worse

    Bryson Bort, Allan Friedman, Chris Kubecka
    Tue, 14:00 - 14:55
    Common Ground
  • My quest for (privileged) identity to own your domain

    Nir Yosha
    Tue, 14:00 - 14:55
    Ground1234!
  • Building an enterprise security knowledge graph to fuel better decisions, faster

    Jon Hawes
    Tue, 14:00 - 14:55
    Ground Truth
  • Discovering Your Passion in Cyber Security

    Cherie Burgett
    Tue, 14:00 - 14:25
    HIre Ground
  • Coordinated Disclosure of ICS Products: Who's got time for that?

    Jay Angus
    Tue, 14:00 - 14:25
    I Am The Cavalry
  • Satellite Vulnerabilities 101

    Elizabeth Wilson
    Tue, 14:00 - 14:25
    Proving Ground
  • What's Next in Coordinating Vulnerability Disclosures

    Katie Trimble
    Tue, 14:00 - 15:55
    Public Ground
  • Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths

    Nicolas Daubresse, Remi Escourrou
    Tue, 14:00 - 17:55
    Training Ground
  • Hands-on: How to Use CALDERA's Chain Mode

    David Hunt, Alexander Manners
    Tue, 14:00 - 17:55
    Training Ground
  • Reverse Engineering Mobile Apps: Never Pay for Transit Again

    Priyank Nigam
    Tue, 14:00 - 14:55
    Underground
  • 14:30
  • AppSec/SDLC/DevSecOps

     
    Tue, 14:30 - 15:25
    CISO Summit
  • Hack (Apart) Your Career - How to Fund Doing What You Love

    John Grigg
    Tue, 14:30 - 14:55
    HIre Ground
  • AIs Wide Open - Making Bots Safer Than Completely $#%cking Unsafe

    Davi Ottenheimer
    Tue, 14:30 - 14:55
    I Am The Cavalry
  • Analyzing user decision making on phishing sites - using mouse data and keyboard dynamics

    Sanne Maasakkers
    Tue, 14:30 - 14:55
    Proving Ground
  • 15:00
  • Using Machines to exploit Machines - harnessing AI to accelerate exploitation

    Guy Barnhart-Magen, Ezra Caltum
    Tue, 15:00 - 15:55
    Breaking Ground
  • The Contemplator Approach: Data Enrichment Through Elastic Stack

    Rodrigo Brenes, Pedro Rodriguez
    Tue, 15:00 - 15:55
    Common Ground
  • Enterprise Overflow: How Breached Credentials Impact Us All

    Robert Paul
    Tue, 15:00 - 15:55
    Ground1234!
  • Grapl - A Graph Platform for Detection and Response

    Colin OBrien
    Tue, 15:00 - 15:55
    Ground Truth
  • The Case for Software Bill of Materials

    Allan Friedman
    Tue, 15:00 - 15:55
    I Am The Cavalry
  • Broken Arrow: applying InfoSec and Forensic practices to escape domestic abuse

    Will Baggett
    Tue, 15:00 - 15:25
    Proving Ground
  • Giving Credit Where It's Not Due: Visualizing Joker's Stash

    Maxwell Aliapoulios, Ian Gray
    Tue, 15:00 - 15:55
    Underground
  • 15:30
  • Crisis Communication & Brand Monitoring

     
    Tue, 15:30 - 16:25
    CISO Summit
  • The Human API: Evolving End Users From Authorized Adversaries Into Our Best Defense.

    Ty Atkin
    Tue, 15:30 - 15:55
    Proving Ground
  • 16:00
  • HSC^2 Hacker Summer Camp Hacker Standup Comedy

     
    Tue, 16:00 - 17:00
    Events
  • Lock Picking Contest

     
    Tue, 16:00 - 16:30
    Events
  • AIs Wide Open - Making Bots Safer Than Completely #$%cking Unsafe

    Davi Ottenheimer
    Tue, 16:00 - 17:55
    Public Ground
  • 16:30
  • CISO Unconference

     
    Tue, 16:30 - 17:25
    CISO Summit
  • 17:00
  • Meltdown's Aftermath: Leveraging KVA Shadow To Bypass Security Protections

    Omri Misgav, Udi Yavo
    Tue, 17:00 - 17:55
    Breaking Ground
  • Mind the Diversity Gap - A Panel Discussion

    Stephanie Ihezukwu, Chloe Messdaghi, Alyssa Miller
    Tue, 17:00 - 17:55
    Common Ground
  • Give the dog a bone - Exploring OSINT capabilities of pen-testing tools

    John Brunn
    Tue, 17:00 - 17:55
    Ground1234!
  • Profiling User Risk: Borrowing from Business Intelligence to Understand the Security of Your Userbase

    Emily Austin
    Tue, 17:00 - 17:55
    Ground Truth
  • How to Fail Well (In Order to be Successful) - From IT to Infosec & More

    Roy Wattanasin
    Tue, 17:00 - 17:25
    HIre Ground
  • Automatic Security Analysis of IoT Firmware

    Matt Brown
    Tue, 17:00 - 17:55
    I Am The Cavalry
  • Burpsuite Team Server - Collaborative Web Pwnage

    Tanner Barnes
    Tue, 17:00 - 17:25
    Proving Ground
  • China as a New Russia? Analyzing Similarities and Differences of Chinese Threat Actors from their Russian Counterparts

    Anne An
    Tue, 17:00 - 17:55
    Underground
  • 17:30
  • Closing Remarks

     
    Tue, 17:30 - 17:55
    CISO Summit
  • Behind the Recruiting Curtain: What Do Recruiters Really Say and Do

    Richard Cho, Matt Duren, Kris Rides
    Tue, 17:30 - 17:55
    HIre Ground
  • The Resilient Hacker: Growth Mindset, Health Hacks & Powerful Help to Navigate Personal Challenges

    Serenity Smile
    Tue, 17:30 - 17:55
    Proving Ground
  • 18:00
  • Neurosecurity: where Infosec meets Brain-machine Interface

    Matt Canham, Ben D Sawyer
    Tue, 18:00 - 18:55
    Breaking Ground
  • Meet the CISO

     
    Tue, 18:00 - 18:55
    Common Ground
  • Why FIDO Security Keys & WebAuthn are Awesome

    Jen Tong
    Tue, 18:00 - 18:55
    Ground1234!
  • Reducing Inactionable Alerts via Policy Layer

    John Seymour
    Tue, 18:00 - 18:25
    Ground Truth
  • I Just Want to Help Make Flying More Secure...not Work with the Government or How I Learned to Love a Govvie

    Steven Luczynski
    Tue, 18:00 - 18:55
    I Am The Cavalry
  • So you think you can CHMOD

    Jared Chandler
    Tue, 18:00 - 18:25
    Proving Ground
  • Ask the EFF

    Eva Galperin, India McKinney, Kurt Opsahl, Nathan Sheard
    Tue, 18:00 - 18:55
    Underground
  • 18:30
  • Trying (Unsuccessfully) to Make Meterpreter into an Adversarial Example

    Andy Applebaum
    Tue, 18:30 - 18:55
    Ground Truth
  • Building the badge- How you can make small, cheap and custom hardware for function or fashion

    James Dietle
    Tue, 18:30 - 18:55
    Proving Ground
  • 19:00
  • Security BSides Organizers Meet-Up

     
    Tue, 19:00 - 21:00
    Events
  • Evaluating Code Embeddings

    Rob Brandon
    Tue, 19:00 - 19:25
    Ground Truth
  • Salesforce Data Governance What dark secrets lurk in your instance??

    Pete Thurston
    Tue, 19:00 - 19:25
    Proving Ground
  • 20:00
  • Queercon BSides Poolside Mixer

     
    Tue, 20:00 - 23:30
    Events
  • Friends of Bill W

     
    Tue, 20:00 - 21:30
    Events
  • 21:30
  • The New Hacker Pyramid

     
    Tue, 21:30 - 02:00
    Events