Training class: Being MEAN - Attacking the MEAN development stack 1:00pm - 6:00pm
Training class: Industrial Control System Network Analysis 1:00pm - 6:00pm
Training class: Introduction to Hardware Hacking / HW Reverse Engineering 1:00pm - 6:00pm
CTF 9:00am - 5:00pm
Lockpicking Village 9:00am - 5:00pm
Threat Intelligence in Numbers 10:00am - 10:55am
Learn How to Speak Malware: A New Approach to Combat Attac... 11:00am - 11:55am
How to Defend Against Penetration Testers ... and Win 2:30pm - 3:25pm
Ghost in the Droid 3:30pm - 4:25pm
Scripting Social Engineering Attacks
Finding Haystacks in Your Needles: Threat Huntin...
Keynote 9:00am - 9:55am
Escaping Alcatraz: Breaking out of Application Sandboxed E... 10:00am - 10:55am
I Mentor and Now You Can Too! 11:00am - 11:55am
Keynote 1:30pm - 2:25pm
Panel: Breaking Into InfoSec 2:30pm - 3:25pm
Panel: Roles in InfoSec That Don't Require You to be an En... 3:30pm - 4:25pm
Coding in Scratch for Kids 4:30pm - 4:55pm
Setup for Closing Ceremonies 5:00pm - 5:30pm
Closing Ceremonies 5:30pm - 6:00pm
Everything I Need To Know About Security I Learned From Wa... 10:00am - 10:55am
From Rogue One to Rebel Alliance: Building Developers into... 11:00am - 11:55am
Heisenberg Cloud: At-Scale Cross-Cloud Adversary Analytics 2:30pm - 3:25pm
Murder Mystery - How Vulnerability Intelligence is Poisoni... 3:30pm - 4:25pm
Back to Basics: Our Journey of Building a Securi...
Introduction to Modern Cryptography
Why Does the Industry Make Insecure Software? Game Theory Applie... 10:00am - 11:00am
Does Dod Level Security Work in the Real World? 11:00am - 11:55am
Security in S, M, L, and XL 2:30pm - 3:25pm
Web Scraping for Fun and Profit
Weaponizing Splunk: Using Blue Team Tools for Ev...
Registration 8:15am - 9:00am
Lunch Break 12:00pm - 1:30pm
Networking Event 6:00pm - 8:30pm