• 10:00
  • Deep Learning for Realtime Malware Detection

    Kate Highnam, Domenic Puzio
    Sun, 10:00 - 10:50
    Far Room - Belay It
  • This Is Not Your Grandfather’s SIEM

    Carson Zimmerman
    Sun, 10:00 - 10:50
    Main Room - Bring It On
  • Embedded Device Vulnerability Analysis Case Study Using TROMMEL

    Madison Oliver, Kyle O’Meara
    Sun, 10:00 - 10:50
    Near Room - Build It
  • 11:00
  • Securing Bare Metal Hardware at Scale

    Matt King, Paul McMillan
    Sun, 11:00 - 11:50
    Far Room - Belay It
  • CITL — Quantitative, Comparable Software Risk Reporting

    Tim Carstens, Patrick Stach, Parker Thompson, Peiter Zatko, Sarah Zatko
    Sun, 11:00 - 11:50
    Main Room - Bring It On
  • 0wn the Con

    The Shmoo Group
    Sun, 11:00 - 11:50
    Near Room - Build It
  • 12:00
  • Getting Cozy with OpenBSM Auditing on MacOS … The Good, the Bad, & the Ugly

    Patrick Wardle
    Sun, 12:00 - 12:50
    Far Room - Belay It
  • Do as I Say, Not as I Do: Hacker Self Improvement and You

    Russell Handorf
    Sun, 12:00 - 12:50
    Main Room - Bring It On
  • SIGINT on a budget: Listening in, gathering data and watching–for less than $100

    Phil Vachon, Andrew Wong
    Sun, 12:00 - 12:50
    Near Room - Build It
  • 13:00
  • ShmooCon Debates

    Jack Daniel, Jack Gavigan, Wendy Nather, Bruce Potter, Elizabeth Wharton
    Sun, 13:00 - 13:50
    Main Room - One Track Mind
  • 14:00
  • Closing Remarks

    Bruce Potter
    Sun, 14:00 - 15:00
    Main Room - One Track Mind