• 09:00
  • Social Engineering At Work – How to use positive influence to gain management buy-in for anything

    April C. Wright
    Sun, 09:00 - 09:50
    Marriott I & II - Track 1
  • Red Mirror: Bringing Telemetry to Red Teaming

    Zach Grace
    Sun, 09:00 - 09:50
    Marriott VII, VIII, IX, X - Track 2
  • Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight

    Omer Yair
    Sun, 09:00 - 09:50
    Kentucky E - Track 3
  • Bug Hunting in RouterOS

    Jacob Baines
    Sun, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Patching: Show me where it hurts

    Cheryl Biswas
    Sun, 09:00 - 09:25
    Kentucky C & D - Stable
  • 09:30
  • Advanced Deception Technology Through Behavioral Biometrics

    Curt Barnard, Dawud Gordon
    Sun, 09:30 - 09:55
    Kentucky C & D - Stable
  • 10:00
  • Ham Radio 4 Hackers

    Devin Noel, Eric Watkins
    Sun, 10:00 - 10:50
    Marriott I & II - Track 1
  • Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes

    Austin Baker, Doug Bienstock
    Sun, 10:00 - 10:50
    Marriott VII, VIII, IX, X - Track 2
  • Cloud Forensics: Putting The Bits Back Together

    Brandon Sherman
    Sun, 10:00 - 10:50
    Kentucky E - Track 3
  • Breaking Into Your Building: A Hackers Guide to Unauthorized Access

    Tim Roberts, Brent White
    Sun, 10:00 - 10:50
    Kentucky F & G - Track 4
  • We are all on the spectrum: What my 10-year-old taught me about leading teams

    Carla A Raisler
    Sun, 10:00 - 10:25
    Kentucky C & D - Stable
  • 10:30
  • No Place Like Home: Real Estate OSINT and OPSec Fails

    John Bullinger
    Sun, 10:30 - 10:55
    Kentucky C & D - Stable
  • 11:00
  • Getting Control of Your Vendors Before They Take You Down

    Dan Browder
    Sun, 11:00 - 11:50
    Marriott I & II - Track 1
  • IoT: Not Even Your Bed Is Safe

    Darby Mullen
    Sun, 11:00 - 11:50
    Marriott VII, VIII, IX, X - Track 2
  • Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil

    Francisco Donoso
    Sun, 11:00 - 11:50
    Kentucky E - Track 3
  • The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.

    Bryce Bearchell
    Sun, 11:00 - 11:50
    Kentucky F & G - Track 4
  • The Layer2 Nightmare

    Chris Mallz
    Sun, 11:00 - 11:25
    Kentucky C & D - Stable
  • 11:30
  • Attacking Azure Environments with PowerShell

    Karl Fosaaen
    Sun, 11:30 - 11:55
    Kentucky C & D - Stable
  • 12:00
  • Cyber Intelligence: There Are No Rules, and No Certainties

    Coleman Kane
    Sun, 12:00 - 12:50
    Marriott I & II - Track 1
  • Fingerprinting Encrypted Channels for Detection

    John B. Althouse
    Sun, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • The MS Office Magic Show

    Pieter Ceelen, Stan Hegt
    Sun, 12:00 - 12:50
    Kentucky E - Track 3
  • Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests

    Tomasz Tuzel
    Sun, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Blue Blood Injection: Transitioning Red to Purple

    Lsly Ayyy
    Sun, 12:00 - 12:25
    Kentucky C & D - Stable
  • 12:30
  • Mirai, Satori, OMG, and Owari - IoT Botnets Oh My

    Pete Arzamendi
    Sun, 12:30 - 12:55
    Kentucky C & D - Stable
  • 13:00
  • Getting Started in CCDC

    Russell Nielsen
    Sun, 13:00 - 13:50
    Marriott I & II - Track 1
  • On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone

    Nick Stephens
    Sun, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • Living off the land: enterprise post-exploitation

    Adam Reiser
    Sun, 13:00 - 13:50
    Kentucky E - Track 3
  • Pwning in the Sandbox: OSX Macro Exploitation & Beyond

    Danny Chrastil, Adam Gold
    Sun, 13:00 - 13:50
    Kentucky F & G - Track 4
  • Comparing apples to Apple

    Adam Mathis
    Sun, 13:00 - 13:25
    Kentucky C & D - Stable
  • 13:30
  • How online dating made me better at threat modeling

    Isaiah Sarju
    Sun, 13:30 - 13:55
    Kentucky C & D - Stable
  • 14:00
  • Changing Our Mindset From Technical To Psychological Defenses

    Andrew Kalat
    Sun, 14:00 - 14:50
    Marriott I & II - Track 1
  • Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

    Gabriel Ryan
    Sun, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • Hillbilly Storytime: Pentest Fails

    Adam Compton
    Sun, 14:00 - 14:50
    Kentucky E - Track 3
  • IOCs Today, Intelligence-Led Security Tomorrow

    Katie Kusjanovic, Matthew Shelton
    Sun, 14:00 - 14:50
    Kentucky F & G - Track 4
  • Threat Hunting with a Raspberry Pi

    Jamie Murdock
    Sun, 14:00 - 14:25
    Kentucky C & D - Stable
  • 14:30
  • M&A Defense and Integration – All that Glitters is not Gold

    Sara Leal, Jason Morrow
    Sun, 14:30 - 14:55
    Kentucky C & D - Stable
  • 15:30
  • Opening Ceremony

     
    Sun, 15:30 - 16:30
    Marriott I & II - Keynote