• 10:00
  • Extracting an ELF From an ESP32

    Chris Lyne, Nick Miles
    Sat, 10:00 - 10:50
    Build It!
  • Battling Supermutants in the Phishing Wasteland

    Zack Allen, Ashlee Benge
    Sat, 10:00 - 10:50
    Belay It!
  • 5G Protocol Vulnerabilities and Exploits

    Roger Piqueras Jover
    Sat, 10:00 - 10:50
    Bring it On!
  • 10:30
  • LABS: Networking / Core Services

     
    Sat, 10:30 - 10:45
    BoF It!
  • 10:45
  • LABS: Vulnerability Management

     
    Sat, 10:45 - 11:00
    BoF It!
  • 11:00
  • Adventures in Hardware Hacking or Building Expensive Tools on a Budget

    Zac Franken
    Sat, 11:00 - 11:50
    Build It!
  • Command and KubeCTL: Real-World Kubernetes Security for Pentesters

    Mark Manning
    Sat, 11:00 - 11:50
    Belay It!
  • The Hacker’s Guide to Cybersecurity Policy in 2020

    Leonard Bailey, Jen Ellis, Nick Leiserson, Kurt Opsahl
    Sat, 11:00 - 11:50
    Bring it On!
  • 11:30
  • LABS: Network Security

     
    Sat, 11:30 - 11:45
    BoF It!
  • 11:45
  • LABS: Infrastructure / Visualization

     
    Sat, 11:45 - 12:00
    BoF It!
  • 12:00
  • Whitelisting LD_PRELOAD for Fun and No Profit

    Tony Lambert
    Sat, 12:00 - 12:50
    Build It!
  • Airplane Mode: Cybersecurity @ 30,000+ Feet

    Olivia Stella
    Sat, 12:00 - 12:50
    Belay It!
  • The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare

    J. Zhanna Malekos Smith, J.D.
    Sat, 12:00 - 12:50
    Bring it On!
  • 13:00
  • Amateur Radio Exams

     
    Sat, 13:00 - 15:00
    BoF It!
  • 14:00
  • Privacy Scores for iOS Apps

    Noelle Garrett
    Sat, 14:00 - 14:50
    Build It!
  • Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up

    Wendy Knox Everette
    Sat, 14:00 - 14:50
    Belay It!
  • Choose Your Own Adventure: Ransomware Response!

    Heather Smith
    Sat, 14:00 - 14:50
    Bring it On!
  • 15:00
  • Chip Decapping on a Budget

    Zach Pahle
    Sat, 15:00 - 15:20
    Build It!
  • Teen Hacks for Obfuscating Identity on Social Media

    Samantha Mosely, Russell Mosley
    Sat, 15:00 - 15:20
    Belay It!
  • Cisco SMB Products — Critical Vulnerablities / 0-day Release

    Ken Pyle
    Sat, 15:00 - 15:20
    Bring it On!
  • 15:30
  • Banjo: An Android Disassembler for Binary Ninja

    Austin Ralls
    Sat, 15:30 - 15:50
    Build It!
  • Software Mitigations for Hardware Vulnerabilities

    Antonio Gomez
    Sat, 15:30 - 15:50
    Belay It!
  • Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling

    Katie Nickels
    Sat, 15:30 - 15:50
    Bring it On!
  • LABS: Log Collection / Aggregation

     
    Sat, 15:30 - 15:45
    BoF It!
  • 15:45
  • LABS: Security Operations Center

     
    Sat, 15:45 - 16:00
    BoF It!
  • 16:00
  • Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud

    Josh Kamdjou
    Sat, 16:00 - 16:50
    Build It!
  • SBOM: Screw it, We’ll Do it Live!

    Audie, Joshua Corman
    Sat, 16:00 - 16:20
    Belay It!
  • Face/Off: Action Plan for Perils & Privileges of Facial Recognition

    Suchi Pahi, Elizabeth Wharton
    Sat, 16:00 - 16:20
    Bring it On!
  • 16:30
  • Security Researcher OPSEC

    Krassimir Tzvetanov
    Sat, 16:30 - 16:50
    Belay It!
  • Using OSINT for Human Rights and Victim Support

    Rae Baker
    Sat, 16:30 - 16:50
    Bring it On!
  • LABS: Threat Hunting / Log Correlation

     
    Sat, 16:30 - 16:45
    BoF It!
  • 16:45
  • LABS: Wireless Network

     
    Sat, 16:45 - 17:00
    BoF It!
  • 17:00
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Build It!
  • Anti-Forensics for Fun and Privacy

    Alissa Gilbert
    Sat, 17:00 - 17:50
    Belay It!
  • Hacking Democracy: On Securing an Election

    Tod Beardsley, Jack Cable, Kimber Dowsett, Casey Ellis, Amélie E. Koran
    Sat, 17:00 - 17:50
    Bring it On!