• 08:00
  • Industrial Control System Network Analysis

    Dennis Murphy
    Tue, 08:00 - 11:55
    Training Ground
  • Hands-on OSINT Crash Course for Hackers

    Chris Kubecka
    Tue, 08:00 - 17:55
    Training Ground
  • Intro to Practical Network Signature Development for Open Source IDS

    Jack Mott, Francis Trudeau, Jason Williams
    Tue, 08:00 - 11:55
    Training Ground
  • 10:00
  • Something Wicked: Defensible Social Architecture in the context of Big Data, Behavioral Econ, Bot Hives, and Bad Actors

    Allison Miller
    Tue, 10:00 - 10:45
    Keynote
  • 10:50
  • How To Lose Friends and Influence People (An Apology)

    Joshua Corman
    Tue, 10:50 - 11:25
    Keynote
  • 11:30
  • GO Forth And Reverse

    Tim Strazzere
    Tue, 11:30 - 12:25
    Breaking Ground
  • Destructive Malware and Interstate Rivalries: The Evolution of Digital Weapons and Geopolitical Conflict

    Mark Dufresne, Andrea Little Limbago
    Tue, 11:30 - 12:25
    Common Ground
  • Hidden Hot Battle Lessons of Cold War: All Learning Models Have Flaws, Some Have Casualties

    Davi Ottenheimer
    Tue, 11:30 - 12:00
    Ground Truth
  • Optimizations for Bitcoin key cracking

    Ryan Castellucci
    Tue, 11:30 - 12:25
    Ground1234!
  • How To Accidentally Get A Job In InfoSec.

    Johnny Xmas
    Tue, 11:30 - 11:55
    Hire Ground
  • IATC Kickoff

    Joshua Corman, Keren Elazari, Beau Woods
    Tue, 11:30 - 12:25
    I Am The Cavalry
  • A Day in the Life of a Product Security Incident Response Manager

    Tyler Townes
    Tue, 11:30 - 11:55
    Proving Ground
  • Banking on Insecurity: The ongoing fairytale of securing financial institutions

    3ncr1pt3d
    Tue, 11:30 - 12:25
    Underground
  • 12:00
  • Deep Learning Neural Networks – Our Fun Attempt At Building One

    Ladi Adefala
    Tue, 12:00 - 12:30
    Ground Truth
  • What A Career In Public Service Is Really About

    Bobbie Stempfley
    Tue, 12:00 - 12:25
    Hire Ground
  • From SOC to CSIRT

    Ben Butz
    Tue, 12:00 - 12:25
    Proving Ground
  • 12:30
  • Mentoring, Networking, Resume Review

     
    Tue, 12:30 - 14:25
    Hire Ground
  • 14:00
  • Koadic C3 - Windows COM Command & Control Framework

    Aleph _Naught, zerosum0x0
    Tue, 14:00 - 14:55
    Breaking Ground
  • Google Apps Scripts Kill Chain

    Maor Bin
    Tue, 14:00 - 14:25
    Common Ground
  • Your model isn't that special: zero to malware model in Not Much Code and where the real work lies

    Hyrum Anderson
    Tue, 14:00 - 14:25
    Ground Truth
  • Measuring the Use and Abuse of Brain Wallets

    Ryan Castellucci, Marie Vasek
    Tue, 14:00 - 14:55
    Ground1234!
  • Public Policy of Things

    Jessica Wilkerson
    Tue, 14:00 - 14:55
    I Am The Cavalry
  • How to escalate privileges to administrator in latest Windows.

    Soya Aoyama
    Tue, 14:00 - 14:25
    Proving Ground
  • Extreme Mobile Application Exploitation

    Sneha Rajguru
    Tue, 14:00 - 17:55
    Training Ground
  • Elastic-ing All the Things - Saving anything at elastic stack and having fun with detections

    Felipe “Pr0teus" Esposito, Rodrigo Montoro
    Tue, 14:00 - 17:55
    Training Ground
  • Navigating the Alternative Facts of Malware Prevention

    Rodrigo Brenes, Josh Sokol
    Tue, 14:00 - 14:55
    Underground
  • 14:30
  • IMSI Catchers And The Happy Yellow Helicopter: Security Challenges At Standing Rock

    Myron Dewey, Lisha Sterling
    Tue, 14:30 - 14:55
    Common Ground
  • Getting insight out of and back into deep neural networks

    Richard Harang
    Tue, 14:30 - 15:25
    Ground Truth
  • Rate the Recruiter

    Ashley Bush, Brian Sheridan
    Tue, 14:30 - 14:55
    Hire Ground
  • Two-Factor Auth - Demand Bidirectional

    Joe Kirwin
    Tue, 14:30 - 14:55
    Proving Ground
  • 15:00
  • The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

    Gabriel Ryan
    Tue, 15:00 - 15:55
    Breaking Ground
  • Hadoop Safari : Hunting For Vulnerabilities

    Mahdi Braik, Thomas Debize
    Tue, 15:00 - 15:55
    Common Ground
  • Sex, Secret and God: A Brief History of Bad Passwords

    Kyle Rankin
    Tue, 15:00 - 15:55
    Ground1234!
  • The Commoditization of Security Solutions: Will You Be Replaced by a Small Script?

    Nathan Sweaney
    Tue, 15:00 - 15:25
    Hire Ground
  • Feds <3 H4ckers

    Allan Friedman, Suzanne Schwartz, MD, Jessica Wilkerson
    Tue, 15:00 - 15:55
    I Am The Cavalry
  • Pwn All The Mobile Porn Apps

    Ben Actis
    Tue, 15:00 - 15:25
    Proving Ground
  • Inside MormonLeaks: the why, the how, and the what

    Privacy P. Pratt
    Tue, 15:00 - 15:55
    Underground
  • 15:30
  • Transfer Learning: Analyst-Sourcing Behavioral Classification

    Ignacio Arnaldo, Tim Mather
    Tue, 15:30 - 16:00
    Ground Truth
  • Breaking the Fourth Wall - Hacking a 50 years old myth

    Ayoub Elaassal
    Tue, 15:30 - 15:55
    Proving Ground
  • 17:00
  • Microservices And FaaS For Offensive Security

    Ryan Baxendale
    Tue, 17:00 - 17:25
    Breaking Ground
  • All The Sales President’s Men

    Patrick McNeil
    Tue, 17:00 - 17:55
    Common Ground
  • The Human Factor: Why Are We So Bad at Security and Risk Assessment?

    John Nye
    Tue, 17:00 - 17:55
    Ground Truth
  • Think Complex Passwords Will Save You?

    Ian Foster, David Hulton
    Tue, 17:00 - 17:55
    Ground1234!
  • Healthcare in Critical Condition

    Joshua Corman, Christian Dameff, Jeff Tulley
    Tue, 17:00 - 17:55
    I Am The Cavalry
  • I Club and So Can You

    Christopher Lamberson
    Tue, 17:00 - 17:25
    Proving Ground
  • Ask the EFF

    Nate Cardozo, Eva Galperin, Kurt Opsahl
    Tue, 17:00 - 17:55
    Underground
  • 17:30
  • Zero Trust Networks: In Theory and in Practice

    Doug Barth, Evan Gilman
    Tue, 17:30 - 18:25
    Breaking Ground
  • How To Hack Recruiting: Turning the Tables (Panel)

    Steve Levy, Pete Radloff, Kris Rides
    Tue, 17:30 - 17:55
    Hire Ground
  • Engineering My Way Into InfoSec

    Nitha Suresh
    Tue, 17:30 - 17:55
    Proving Ground
  • 18:00
  • The Struggle Is Real: My Journey With Mental Health Issues

    Joel Cardella
    Tue, 18:00 - 18:25
    Common Ground
  • Behavioral Analysis from DNS and Network Traffic

    Josh Pyorre
    Tue, 18:00 - 18:55
    Ground Truth
  • Cash in the aisles: How gift cards are easily exploited

    William Caput
    Tue, 18:00 - 18:55
    Ground1234!
  • Recruiter Smack Down (Panel)

    Matt Duren, Jen Havermann, Steve Levy, Pete Radloff, Kris Rides
    Tue, 18:00 - 18:25
    Hire Ground
  • HHS Task Force (Panel)

    Joshua Corman
    Tue, 18:00 - 18:25
    I Am The Cavalry
  • Introduction to Reversing and Pwning

    David Weinman
    Tue, 18:00 - 18:25
    Proving Ground
  • Skip tracing for fun and profit

    Rhett Greenhagen
    Tue, 18:00 - 18:55
    Underground
  • 18:30
  • SniffAir – An Open-Source Framework for Wireless Security Assessments

    Steven Darracott, Matthew Eidelberg
    Tue, 18:30 - 18:55
    Breaking Ground
  • Regulatory Nets vs. The Fishing Hook Of Litigation

    Wendy Knox Everette
    Tue, 18:30 - 18:55
    Common Ground
  • Internet of Cars

    Abe Chen, Chris King, Kevin Tierney
    Tue, 18:30 - 19:25
    I Am The Cavalry
  • 19:00
  • Writing Malware Without Writing Code

    Gal Bitensky
    Tue, 19:00 - 19:25
    Breaking Ground
  • Pwning Software-Defined Networking (SDN)

    Tommy Chin
    Tue, 19:00 - 19:25
    Common Ground
  • Sympathy for the Developer

    Sarah Gibson
    Tue, 19:00 - 19:30
    Ground Truth
  • Going Passwordless

    Evan Johnson
    Tue, 19:00 - 19:55
    Ground1234!
  • The Attack Chain Of A Nation-State (Equation Group)

    Tal Liberman, Omri Misgav
    Tue, 19:00 - 19:25
    Underground
  • 19:30
  • YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection

    Austin Byers
    Tue, 19:30 - 19:55
    Breaking Ground
  • Hacking the Law: A Call for Action – Bug Bounties Legal Terms as a Case Study

    Amit Elazari
    Tue, 19:30 - 19:55
    Common Ground