• 08:00
  • Practical Malware Analysis - Hands-On

    Sam Bowne, Devin Duffy, Dylan James Smith
    Wed, 08:00 - 11:55
    Training Ground
  • Effective YARA

    Monty St John
    Wed, 08:00 - 17:55
    Training Ground
  • 09:00
  • Crams and Exams for Hams

    Falcon Darkstar Momot
    Wed, 09:00 - 12:25
    Training Ground
  • 10:00
  • CheckPlease - Payload-Agnostic Implant Security

    Brandon Arvanaghi, Christopher Truncer
    Wed, 10:00 - 10:55
    Breaking Ground
  • Purple Team: How This Color Can Help You And Your Organisation Learn and Get Better

    Patrick Mathieu
    Wed, 10:00 - 10:55
    Common Ground
  • The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software

    Joshua Saxe
    Wed, 10:00 - 10:25
    Ground Truth
  • Safer Storage and Handling of User Answers to Security Questions

    Arnold Reinhold
    Wed, 10:00 - 10:55
    Ground1234!
  • Hacking Is Easy, Hiring Is Hard: Managing Security People

    Mike Murray
    Wed, 10:00 - 10:55
    Hire Ground
  • Scamming the Scammers - Becoming the Robin Hood of the phones

    Nathan Clark
    Wed, 10:00 - 10:25
    Proving Ground
  • Why is China all up in my SQL server?

    Andrew Brandt
    Wed, 10:00 - 10:55
    Underground
  • 10:30
  • Mining Software Vulns in SCCM / NIST’s NVD– The Rocky Road to Data Nirvana

    Loren Gordon
    Wed, 10:30 - 10:55
    Ground Truth
  • Technical Tactics: Embedded Linux Software BOM

    daniel beard
    Wed, 10:30 - 10:40
    I Am The Cavalry
  • Applied OSINT: Enabling Better Social Engineering for Better Pen Tests

    Joe Gray
    Wed, 10:30 - 10:55
    Proving Ground
  • 10:45
  • Technical Tactics: Fear & loathing in building management systems

    Edward Farrell
    Wed, 10:45 - 10:55
    I Am The Cavalry
  • 11:00
  • Network Forensic Analysis in an Encrypted World

    Will Peteroy, Justin Warner
    Wed, 11:00 - 11:55
    Breaking Ground
  • Baby Got Hack Back

    Leonard Bailey, Jen Ellis, Rob Graham, Davi Ottenheimer
    Wed, 11:00 - 12:25
    Common Ground
  • Building a Benign Data Set

    Rob Brandon, John Seymour
    Wed, 11:00 - 11:25
    Ground Truth
  • TMTO...Y?

    Steve Thomas
    Wed, 11:00 - 11:55
    Ground1234!
  • Hacking Tech Interviews

    Adam Brand
    Wed, 11:00 - 11:25
    Hire Ground
  • Lightning Talks: Thinking Different

    David Batz, Steven Luczynski, Caroline Wong, Robert Wood
    Wed, 11:00 - 11:55
    I Am The Cavalry
  • One OSINT Tool to Rule Them All

    Emilie St-Pierre
    Wed, 11:00 - 11:25
    Proving Ground
  • Accessibility: A Creative Solution to Living Life Blind

    Shaf Patel
    Wed, 11:00 - 11:55
    Underground
  • 11:30
  • A System Dynamics Approach to CNO Modelling

    Sara Mitchell
    Wed, 11:30 - 11:55
    Ground Truth
  • (In)Outsider Trading - Hacking stocks using public information and influence.

    Richard Hocking
    Wed, 11:30 - 11:55
    Proving Ground
  • 12:00
  • Abusing Webhooks for Command and Control

    Dimitry Snezhkov
    Wed, 12:00 - 12:25
    Breaking Ground
  • The Role of Data Visualization in Improving Machine Learning Models

    Phil Roth
    Wed, 12:00 - 12:30
    Ground Truth
  • Rethinking P@ssw0rd Strength Beyond Brute-force Entropy

    Ross Dickey
    Wed, 12:00 - 12:25
    Ground1234!
  • Red/Blue Q&A: Pressure Test Lightning Talk Ideas

    David Batz, Steven Luczynski, Caroline Wong, Robert Wood
    Wed, 12:00 - 12:25
    I Am The Cavalry
  • Your Facts Are Not Safe with Us: Russian Information Operations as Social Engineering

    Meagan Keim
    Wed, 12:00 - 12:25
    Proving Ground
  • Kick up the Jams

    Eric Rand
    Wed, 12:00 - 12:25
    Underground
  • 14:00
  • SECSMASH: Using Security Products to own the Enterprise'

    Kevin Dick, Steven Flores
    Wed, 14:00 - 14:55
    Breaking Ground
  • Minimum Viable Risk Management Program

    Rachael Lininger
    Wed, 14:00 - 14:55
    Common Ground
  • Data visualization in security: Still home of the WOPR?

    Matthew Park
    Wed, 14:00 - 14:25
    Ground Truth
  • Protecting Windows Credentials: An Excessive Guide for Security Professionals

    Mark Burnett
    Wed, 14:00 - 14:55
    Ground1234!
  • Hacking College, a Cybersecurity Career, and Certifications

    Marcus J. Carey
    Wed, 14:00 - 14:25
    Hire Ground
  • IATC Cyber Crisis Simulation

    Joshua Corman, Jay Healey, Beau Woods
    Wed, 14:00 - 15:55
    I Am The Cavalry
  • Robust Defense for the rest of Us

    Russell Mosley
    Wed, 14:00 - 14:25
    Proving Ground
  • Auditing Of IoT Devices

    Martin Rakhmanov, Vladimir Zakharevich
    Wed, 14:00 - 17:55
    Training Ground
  • Advanced Wireless Attacks Against Enterprise Networks

    Gabriel Ryan
    Wed, 14:00 - 17:55
    Training Ground
  • Poking bears: Validating the truth from IoCs in attack postmortem reports

    Andrew Brandt
    Wed, 14:00 - 14:55
    Underground
  • 14:30
  • Exploration of Novel Visualizations for Information Security Data

    Roni Choudhury, Brian Wylie
    Wed, 14:30 - 14:55
    Ground Truth
  • It’s Not Me, It’s You: How To Be A Better Hiring Manager or Rooting Out Excellent Candidates Despite Themselves

    Andrew Johnson
    Wed, 14:30 - 14:50
    Hire Ground
  • I got more games than Milton Bradley: Incentivize a positive change in your security culture

    Drew Rose
    Wed, 14:30 - 14:55
    Proving Ground
  • 15:00
  • Modern Internet-Scale Network Reconnaissance

    underflow
    Wed, 15:00 - 15:55
    Breaking Ground
  • DefCon DarkNet Badge Hardware And Software: An Introduction To Custom Badge Building

    Edward Abrams, CmdC0de, Gater_Byte
    Wed, 15:00 - 15:55
    Common Ground
  • Magical Thinking... and how to thwart it.

    Mara Tam
    Wed, 15:00 - 15:25
    Ground Truth
  • Password Cracking 201: Beyond the Basics

    Royce Williams
    Wed, 15:00 - 15:55
    Ground1234!
  • Interrogation Techniques for Fun and Profit: Designing better tools for your SOC team

    Karolyn Bachelor
    Wed, 15:00 - 15:25
    Proving Ground
  • (Even More) Mainframes? On my Internet?

    Soldier of FORTRAN
    Wed, 15:00 - 15:55
    Underground
  • 15:30
  • Is Data Visualization still necessary?

    Edmond Rogers, Grace Rogers, John Stillwell
    Wed, 15:30 - 16:00
    Ground Truth
  • Messing with Forensic Analysts: Modifying VSS Snapshots

    James Clawson
    Wed, 15:30 - 15:55
    Proving Ground
  • 17:00
  • Vaccination - An Anti-Honeypot Approach

    Gal Bitensky
    Wed, 17:00 - 17:55
    Breaking Ground
  • Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations

    Jeff Toth
    Wed, 17:00 - 17:55
    Common Ground
  • Grappling Hooks on the Ivory Tower: This Year in Practical Academic Research

    Falcon Darkstar Momot, Brittany Postnikoff
    Wed, 17:00 - 17:55
    Ground Truth
  • Automating Crypto Bugs Discovery

    Jean-Philippe Aumasson, Yolan Romailler
    Wed, 17:00 - 17:25
    Ground1234!
  • Hacking Office Politics for Cybersecurity Leaders

    Caroline Wong, Robert Wood
    Wed, 17:00 - 17:25
    Hire Ground
  • IATC Mock Congressional Hearing

    Jay Healey, Jessica Wilkerson
    Wed, 17:00 - 18:45
    I Am The Cavalry
  • Why can't we be friends? (Ask a Fed.)

    Russell Handorf
    Wed, 17:00 - 17:55
    Underground
  • 17:30
  • How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches

    Yael Basurto, Guillermo Buendia
    Wed, 17:30 - 17:55
    Ground1234!
  • 18:00
  • Lessons from the front lines: New York City Cyber Command

    Colin Ahern
    Wed, 18:00 - 18:55
    Breaking Ground
  • How To Respond To Cops Who Want Your Passwords

    Stephanie Lacambra
    Wed, 18:00 - 18:55
    Common Ground
  • How to make metrics and influence people

    Leila Powell
    Wed, 18:00 - 18:55
    Ground Truth
  • F! Passwords!

    David M. Zendzian
    Wed, 18:00 - 18:55
    Ground1234!
  • CTF all the things: Leveraging gamification to up your security game

    Matt Pardo
    Wed, 18:00 - 18:25
    Proving Ground
  • /.git/ing All Your Data

    Jesse Kinser
    Wed, 18:00 - 18:25
    Underground
  • 18:30
  • Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation

    Jason Beatty
    Wed, 18:30 - 18:55
    Proving Ground
  • How I Scanned The Internet For NSA Compromised Firewalls

    chuck mcauley
    Wed, 18:30 - 18:55
    Underground
  • 18:45
  • IATC Closing

     
    Wed, 18:45 - 18:55
    I Am The Cavalry
  • 19:00
  • Radio frequencies all around us! What data are you leaking and what is done with it?

    Keya Lea Horiuchi
    Wed, 19:00 - 19:25
    Proving Ground