Malware Reverse Engineering Class - ECCouncil 9:00am - 5:00pm
Pivot Into Pentesting - Coalfire LABS 9:00am - 5:00pm
Opening remarks
Keynote address 9:00am - 9:30am
How to Use Code Signing to Prote... 9:30am - 10:00am
Exploiting OAuth 2.0 and OpenID Connect: Lessons...
Coalfire
From 0 to red team — what does t... 10:30am - 11:00am
Synopsys
How to build your own SIEM with... 11:00am - 11:30am
Corelight
Flex Seal your CI/CD Pipeline 1:00pm - 1:55pm
Software Supply Chain Threat Det... 2:00pm - 2:30pm
How to Give Good Resume! 2:30pm - 3:00pm
GuidePoint Securit...
The Men Who Never Were: Assessin... 3:00pm - 3:30pm
Realigning From Chaotic Evil 3:30pm - 4:30pm
Wrapup & Giveaways 4:30pm - 5:00pm
Binary Defense
Conquering the Cloud: Defense-in-Depth Strategies for Amaz... 9:30am - 10:25am
Critical Path
Connecting the Dots, Detecting Threats, and Protecting the Enter... 10:30am - 11:30am
Crypto-Agility: Responding Quick... 11:30am - 12:00pm
NCCGroup
Compromising Containers and Clusters 1:00pm - 2:00pm
Manuals for Herding Clouds: Free tools for improved security 2:00pm - 3:00pm
Automated Web Application and AP... 3:00pm - 3:30pm
Cybersecurity Merger and Acquisi... 3:30pm - 4:00pm
What to expect when you are expe... 4:00pm - 4:30pm
Diversity in STEM panel 9:30am - 10:30am
Look! There’s a Threat Model in My DevOps 10:30am - 11:30am
Serverless Password Cracking or:... 11:30am - 12:00pm
Expose Yourself Without Insecurity: Cloud Breach...
Bishop Fox
The Hacker Hippocampus: Meet you... 1:30pm - 2:00pm
Low Tech & Insecure: Building He... 3:00pm - 3:30pm
Kenna Security
Secure Code Warrior CTF Kickoff 9:30am - 10:00am