• 08:30
  • Opening Ceremonies

     
    Fri, 08:30 - 08:55
    Marriott I & II - Keynote
  • 09:00
  • How to influence security technology in kiwi underpants

    Benjamin Delpy
    Fri, 09:00 - 09:50
    Marriott I & II - Keynote
  • 10:00
  • Panel Discussion - At a Glance: Information Security

    Lesley Carhart, David Kennedy, Ed Skoudis, John Strand
    Fri, 10:00 - 10:50
    Marriott I & II - Keynote
  • 12:00
  • IRS, HR, Microsoft and your Grandma: What they all have in common

    Chris Hadnagy, Cat Murdock
    Fri, 12:00 - 12:50
    Marriott I & II - Track 1
  • I Can Be Apple, and So Can You

    Joshua Pitts
    Fri, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow

    Walter Legowski
    Fri, 12:00 - 12:50
    Kentucky E - Track 3
  • The History of the Future of Cyber-Education

    Winn Schwartau
    Fri, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Red Teaming gaps and musings

    Samuel Sayen
    Fri, 12:00 - 12:25
    Kentucky C & D - Stable
  • 12:30
  • A Process is No One: Hunting for Token Manipulation

    Jared Atkinson, Robby Winchester
    Fri, 12:30 - 12:55
    Kentucky C & D - Stable
  • 13:00
  • #LOLBins - Nothing to LOL about!

    Oddvar Moe
    Fri, 13:00 - 13:50
    Marriott I & II - Track 1
  • From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It

    Sean Metcalf
    Fri, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • When Macs Come Under ATT&CK

    Richie Cyrus
    Fri, 13:00 - 13:50
    Kentucky E - Track 3
  • State of Win32k Security: Revisiting Insecure design

    Vishal Chauhan
    Fri, 13:00 - 13:50
    Kentucky F & G - Track 4
  • Fuzz your smartphone from 4G base station side

    Tso-Jen Liu
    Fri, 13:00 - 13:25
    Kentucky C & D - Stable
  • 13:30
  • Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That?

    Emma Zaballos
    Fri, 13:30 - 13:55
    Kentucky C & D - Stable
  • 14:00
  • Everything Else I Learned About Security I Learned From Hip-Hop

    Paul Asadoorian
    Fri, 14:00 - 14:50
    Marriott I & II - Track 1
  • MS17-010?

    zerosum0x0
    Fri, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • Abusing IoT Medical Devices For Your Precious Health Records

    Nick Delewski, Saurabh Harit
    Fri, 14:00 - 14:50
    Kentucky E - Track 3
  • Offensive Browser Extension Development

    Michael Weber
    Fri, 14:00 - 14:50
    Kentucky F & G - Track 4
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 14:00 - 14:25
    Kentucky C & D - Stable
  • 14:30
  • Escoteric Hashcat Attacks

    Evilmog
    Fri, 14:30 - 14:55
    Kentucky C & D - Stable
  • 15:00
  • Hackers, Hugs, & Drugs: Mental Health in Infosec

    Amanda Berlin
    Fri, 15:00 - 15:50
    Marriott I & II - Track 1
  • The Unintended Risks of Trusting Active Directory

    Lee Christensen, Matt Nelson, Will Schroeder
    Fri, 15:00 - 15:50
    Marriott VII, VIII, IX, X - Track 2
  • Detecting WMI exploitation

    Michael Gough
    Fri, 15:00 - 15:50
    Kentucky E - Track 3
  • Protect Your Payloads: Modern Keying Techniques

    Leo Loobeek
    Fri, 15:00 - 15:50
    Kentucky F & G - Track 4
  • NOOb OSINT in 30 Minutes or less!

    Greg Simo
    Fri, 15:00 - 15:25
    Kentucky C & D - Stable
  • 15:30
  • RFID Luggage Tags, IATA vs Real Life

    Daniel Lagos
    Fri, 15:30 - 15:55
    Kentucky C & D - Stable
  • 16:00
  • Android App Penetration Testing 101

    Derek Banks, Joff Thyer
    Fri, 16:00 - 16:50
    Marriott I & II - Track 1
  • Lessons Learned by the WordPress Security Team

    Aaron D Campbell
    Fri, 16:00 - 16:50
    Marriott VII, VIII, IX, X - Track 2
  • Gryffindor | Pure JavaScript, Covert Exploitation

    Matthew Toussain
    Fri, 16:00 - 16:50
    Kentucky E - Track 3
  • Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device

    Nancy Snoke, Phoenix Snoke
    Fri, 16:00 - 16:50
    Kentucky F & G - Track 4
  • #LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection

    Carl Alexander
    Fri, 16:00 - 16:25
    Kentucky C & D - Stable
  • 16:30
  • Maintaining post-exploitation opsec in a world with EDR

    Martin Roberts, Michael Roberts
    Fri, 16:30 - 16:55
    Kentucky C & D - Stable
  • 17:00
  • Draw a Bigger Circle: InfoSec Evolves

    Cheryl Biswas
    Fri, 17:00 - 17:50
    Marriott I & II - Track 1
  • IronPython... omfg

    Marcello Salvati
    Fri, 17:00 - 17:50
    Marriott VII, VIII, IX, X - Track 2
  • Instant Response: Making IR faster than you thought possible!

    Mick Douglas, Josh Johnson
    Fri, 17:00 - 17:50
    Kentucky E - Track 3
  • In-Memory Persistence: Terminate & Stay Resident Redux

    Scott Lundgren
    Fri, 17:00 - 17:50
    Kentucky F & G - Track 4
  • Hey! I found a vulnerability – now what?

    Lisa Bradley, CRob
    Fri, 17:00 - 17:25
    Kentucky C & D - Stable
  • 17:30
  • Foxtrot C2: A Journey of Payload Delivery

    Dimitry Snezhkov
    Fri, 17:30 - 17:55
    Kentucky C & D - Stable
  • 18:00
  • Ridesharks

    Kaleb Brown
    Fri, 18:00 - 18:25
    Kentucky C & D - Stable