• 08:00
  • Hacking the STORM

    Kevin King, Justin Whitehead
    Wed, 08:00 - 17:55
    Training Ground
  • Using Wireshark for Incident Response and Threat Hunting

    Michael Wylie
    Wed, 08:00 - 17:55
    Training Ground
  • Tournament: The Ultimate Secure Coding Throw Down

    Steve Allor, Jim Manico
    Wed, 08:00 - 11:55
    Training Ground
  • Linux Hardening - The Easy Way

    Guy Barnhart-Magen
    Wed, 08:00 - 11:55
    Training Ground
  • Introduction to Cryptographic Attacks

    Matt Cheung
    Wed, 08:00 - 11:55
    Training Ground
  • 09:00
  • Free and Fair Elections in an Internet Era

    Andre McGregor, Sheila Nix, Maurice Turner
    Wed, 09:00 - 09:55
    Public Ground
  • 10:00
  • Loki: Add a little chaos to your USB drive

    Michael Rich
    Wed, 10:00 - 10:55
    Breaking Ground
  • The Road to Hell is Paved with Bad Passwords

    Chris Kubecka
    Wed, 10:00 - 10:55
    Common Ground
  • Breaking Smart [Bank] Statement

    Manuel Nader
    Wed, 10:00 - 10:55
    Ground1234!
  • Security data science -- Getting the fundamentals right

    Richard Harang
    Wed, 10:00 - 10:55
    Ground Truth
  • CTFs for Fun and Profit: Playing Games to Build your Skills

    David Tomaschik
    Wed, 10:00 - 10:55
    Ground Floor
  • How to Treat Your Hacker (and Responsible Vulnerability Disclosure)

    Monta Elkins
    Wed, 10:00 - 10:55
    I Am The Cavalry
  • Making your website vulnerable for fun and security awareness

    Kenny Jansson
    Wed, 10:00 - 10:25
    Proving Ground
  • Let's hear from the Hackers: What should DOJ do next?

    Leonard Bailey
    Wed, 10:00 - 11:55
    Public Ground
  • 10:30
  • The Importance of Culture in Security

    Mike Murray
    Wed, 10:30 - 11:25
    HIre Ground
  • Human Honeypots or: How I Learned to Stop Worrying and Love the Implant

    Nick Koch
    Wed, 10:30 - 10:55
    Proving Ground
  • 11:00
  • From EK to DEK: An Analysis of Modern Document Exploit Kits

    Joshua Reynolds
    Wed, 11:00 - 11:55
    Breaking Ground
  • Prisoner Number Six

    Lavi Lazarovitz, Nimrod Stoler
    Wed, 11:00 - 11:55
    Common Ground
  • An investigation of the security of passwords derived from African languages

    Sibusiso Sishi
    Wed, 11:00 - 11:55
    Ground1234!
  • Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection

    Veronica Weiss
    Wed, 11:00 - 11:55
    Ground Truth
  • Hidden Networks Pivoting: Redefining DNS Rebinding Attack

    Nimrod Levy, Nicholas Mosier
    Wed, 11:00 - 11:55
    Ground Floor
  • Hacking the Pentagon: How a Rebel Alliance Shifts Culture to Protect National Security

    Brett Goldstein, Harlan Lieberman-Berg
    Wed, 11:00 - 11:55
    I Am The Cavalry
  • The struggles of teaching automation

    Joe O’Connell
    Wed, 11:00 - 11:25
    Proving Ground
  • 11:30
  • Hacking from Above: A Brief Guide for Transitioning to Leadership

    Joey Maresca
    Wed, 11:30 - 11:55
    HIre Ground
  • The SOC Counter ATT&CK

    Mathieu Saulnier
    Wed, 11:30 - 11:55
    Proving Ground
  • 12:00
  • From email address to phone number

    Martin Vigo
    Wed, 12:00 - 12:25
    Breaking Ground
  • Excuse Me, Your Sword Is In My Eye: Responding to Red Teams and Intrusions in 2019 and Beyond

    Jeremy Galloway
    Wed, 12:00 - 12:25
    Common Ground
  • (Im)proper Database Authentication

    Mitch Wasson
    Wed, 12:00 - 12:25
    Ground1234!
  • Old things are new again: efficient automatic signature generation for malware classification

    Hyrum Anderson
    Wed, 12:00 - 12:25
    Ground Truth
  • Low & Slow - Techniques for DNS Data Exfiltration

    Dimitri Fousekis
    Wed, 12:00 - 12:25
    Ground Floor
  • Certification and Labeling in IoT

    Richard Manning
    Wed, 12:00 - 12:25
    I Am The Cavalry
  • The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage

    Vanessa Redman
    Wed, 12:00 - 12:25
    Proving Ground
  • 13:30
  • Noobs: Training the Next Generation of Security Engineers

    David Seidman
    Wed, 13:30 - 13:55
    HIre Ground
  • 14:00
  • Virtual Breakpoints for x86_64

    Gregory Price
    Wed, 14:00 - 14:55
    Breaking Ground
  • Escape the Questionnaire Quagmire: A thoughtful approach to addressing security inquiries from customers and prospects

    Katie Ledoux
    Wed, 14:00 - 14:25
    Common Ground
  • Who dis? The Right Way To Authenticate

    Dhivya Chandramouleeswaran, Lakshmi Sudheer
    Wed, 14:00 - 14:55
    Ground1234!
  • Reduce, Reuse and Recycle ML models - and the security powers is yours

    Ram Shankar Siva Kumar
    Wed, 14:00 - 14:55
    Ground Truth
  • Windows 10 DFIR Challenges

    Andrew Case
    Wed, 14:00 - 14:55
    Ground Floor
  • Startup Security Leadership: Lessons to Level Up from Fortune 100 to Tech Startup

    Ty Sbano
    Wed, 14:00 - 14:25
    HIre Ground
  • Real World Security in a Clinical Healthcare Environment: Hacking a Hospital

    Paul Dant
    Wed, 14:00 - 14:55
    I Am The Cavalry
  • I’m a hunter! But what does that mean?

    Yasmine Johnston-Ison
    Wed, 14:00 - 14:25
    Proving Ground
  • Certification and Labeling for IoT

    Richard Manning
    Wed, 14:00 - 15:55
    Public Ground
  • Pentesting ICS 102

    Arnaud Soullie, Alexandrine Torrents
    Wed, 14:00 - 17:55
    Training Ground
  • Finding Evil with Mitre ATT&CK and the Elastic Stack

    Kent Brake, Matteo Rebeschini
    Wed, 14:00 - 17:55
    Training Ground
  • Hands on Hacking The OWASP TOP 10 and beyond

    Christopher Simon Hanlon
    Wed, 14:00 - 17:55
    Training Ground
  • 14:30
  • Getting CVSS, NVD, and CVEs to Work for You: Standardizing and Scaling Your Vulnerability Risk Analysis

    Matthew Hahn, Luke Szczutowski
    Wed, 14:30 - 14:55
    Common Ground
  • Breaking the Bodyguards

    Chrissy Morgan
    Wed, 14:30 - 14:55
    Proving Ground
  • 15:00
  • ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator

    Nicholas Mosier
    Wed, 15:00 - 15:55
    Breaking Ground
  • Have You Distributed Randomness?

    Yolan Romailler
    Wed, 15:00 - 15:55
    Common Ground
  • Exploiting Windows Group Policy for Reconnaissance and Attack

    Darren Mar-Elia
    Wed, 15:00 - 15:55
    Ground1234!
  • Scheming with Machines: Using ML to Support Offensive Teams

    Nick Landers, Will Pearce
    Wed, 15:00 - 15:55
    Ground Truth
  • ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for better sleep and a safer tomorrow.

    Jamie Williams, Sarah Yoder
    Wed, 15:00 - 15:55
    Ground Floor
  • Why journalists and hackers need each other (a panel discussion with infosec reporters)

    Joseph Cox, Sean Lyngaas, Lily Hay Newman, Kim Zetter
    Wed, 15:00 - 15:55
    I Am The Cavalry
  • Cover Your A**

    Suchi Pahi
    Wed, 15:00 - 15:25
    Proving Ground
  • 15:30
  • Cyber Deception after Detection: Safe observation environment using Software Defined Networking

    TORU SHIMANAKA
    Wed, 15:30 - 15:55
    Proving Ground
  • 16:00
  • Why we need a Cyber Peace Institute

    Eli Sugarman
    Wed, 16:00 - 17:55
    Public Ground
  • 17:00
  • At Your Service - Abusing the Service Workers Web API

    Daniel Abeles, Shay Shavit
    Wed, 17:00 - 17:55
    Breaking Ground
  • CloudSec Rules Everything Around Me (C.R.E.A.M.)

    Kyle Dickinson
    Wed, 17:00 - 17:55
    Common Ground
  • Why can't we be friends? (Ask a Fed & the EFF.)

    Russell Handorf, Kurt Opsahl
    Wed, 17:00 - 17:55
    Ground1234!
  • Birthday Hunting

    Jack Burgess
    Wed, 17:00 - 17:25
    Ground Truth
  • Cyber Threat Intel & APTs 101

    Ronnie Obenhaus, John Stoner
    Wed, 17:00 - 17:55
    Ground Floor
  • We the People: Providing for a 'common defence' with CVD

    Matthew Cornelius, Cameron Dixon
    Wed, 17:00 - 17:55
    I Am The Cavalry
  • Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes

    Anna Skelton
    Wed, 17:00 - 17:25
    Proving Ground
  • 17:30
  • All that glitters isn't Chrome: Hunting for suspicious browser extensions

    Mike Sconzo
    Wed, 17:30 - 17:55
    Ground Truth
  • Baited Canaries - Monitoring attackers with active beacons

    Gregory Caswell
    Wed, 17:30 - 17:55
    Proving Ground
  • 18:00
  • HAM License Exams

     
    Wed, 18:00 - 18:55
    Events
  • State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin

    Gerald Doussot, Roger Meyer
    Wed, 18:00 - 18:55
    Breaking Ground
  • Meet the Nation This Week on Sunday: A Special Vulnerability Edition

    Leonard Bailey, Tod Beardsley, Jen Ellis, Colin Morgan
    Wed, 18:00 - 18:55
    Common Ground
  • Scratching the Surface of Risk

    Wade Baker, Benjamin Edwards
    Wed, 18:00 - 18:55
    Ground Truth
  • Musings of an Accidental CISO

    Brian Markham
    Wed, 18:00 - 18:55
    Ground Floor
  • No IOUs with IOT

    Bryson Bort
    Wed, 18:00 - 18:25
    I Am The Cavalry
  • Securing Fast (and Furious) DevOps pipelines

    Abdessamad TEMMAR
    Wed, 18:00 - 18:25
    Proving Ground
  • 18:30
  • "Hackers of the world - unite?"

    Keren Elazari
    Wed, 18:30 - 18:55
    I Am The Cavalry
  • Please inject me, a x64 code injection

    Alon Weinberg
    Wed, 18:30 - 18:55
    Proving Ground
  • 19:00
  • Closing Ceremonies

     
    Wed, 19:00 - 20:00
    Events
  • 20:00
  • Friends of Bill W (Sat.)

     
    Wed, 20:00 - 21:30
    Events
  • 22:00
  • BSidesLV Pool Party

     
    Wed, 22:00 - 23:59
    Events