• 10:00
  • Effective Monitoring for Operational Security

    Ryan St. Germain, Russell Mosley
    Sun, 10:00 - 10:20
    Track 1
  • Plight at the end of the Tunnel

    Anjum Ahuja
    Sun, 10:00 - 10:20
    Track 2
  • Threat Hunting with ELK

    Ben Hughes, Liana Parakesyan, Peter Quach
    Sun, 10:00 - 17:00
    Training 1
  • Cloud Busting: Understanding Cloud-Based Digital Forensics

    Kerry Hazelton, Tigran Terpandjian
    Sun, 10:00 - 17:00
    Training 2
  • 10:30
  • Rise of the Miners

    Josh Grunzweig
    Sun, 10:30 - 11:20
    Track 1
  • Malware Analysis and Automation using Binary Ninja

    Erika Noerenberg
    Sun, 10:30 - 11:20
    Track 2
  • 12:00
  • Keynote - Between a SOC and a Hard Place Panel

    James Callahan, Andrew Marini, Dustin Shirley, Shawn Thomas
    Sun, 12:00 - 13:00
    Track 1
  • 14:00
  • Using Atomic Red Team to Test Endpoint Solutions

    Adam Mathis
    Sun, 14:00 - 14:50
    Track 1
  • Exercise Your SOC: How to run an effective SOC response simulation

    Brian Andrzejewski
    Sun, 14:00 - 14:50
    Track 2
  • 15:00
  • Adding Simulated Users to Your Pentesting Lab with PowerShell

    Barrett Adams, Chris Myers
    Sun, 15:00 - 15:50
    Track 1
  • Building a Predictive Pipeline to Rapidly Detect Phishing Domains

    Wes Connell
    Sun, 15:00 - 15:50
    Track 2
  • 16:00
  • Closing Ceremony

     
    Sun, 16:00 - 17:00
    Track 1