Keynote 9:00am - 9:55am
Airplane Mode: Cybersecurity @ 30,000+ Feet 10:00am - 10:55am
Red Team Handcuffs 11:00am - 11:55am
Lunch and Connecting 12:00pm - 1:00pm
ZeroTrusting Serverless Applications: Protecting Microserv... 1:00pm - 1:55pm
Y'all Tryna Understand Azure AD and RBAC or Nah? 2:00pm - 2:55pm
We went to Iowa, and all we have to show for it is this fe... 3:00pm - 3:55pm
Closing Ceremonies 4:00pm - 4:45pm
Trust: from Zero to Hero 10:00am - 10:55am
MQQT: Tiny Protocol, Big Vulnerabilities 11:00am - 11:55am
Anti-Checklist Culture: Building a Useful Security Complia... 1:00pm - 1:55pm
Hiding In The Clouds: How Attackers Can Use Applications C... 2:00pm - 2:55pm
Kubernetes Practical Attack and Defense 3:00pm - 3:55pm
LockPick Village Live Session 10:00am - 10:55am
See No Revil, Hear No Revil, Speak No Revil: For...
Introduction to PCB Analysis & Hardware Reverse...
Peek Inside the Pelicans - What Gear Do Covert Entry Teams... 1:00pm - 1:55pm
LockPick Village Live Session 2:00pm - 3:55pm
Exploiting Bluetoo...
Brainjacking: Is i...
Building hacking t...
Micro-Agency, Mega-Adversary, Macro-Response
FreeIPA: Attacking the Active Directory of Linux
Cheap Shot: Hunting Low-Cost Attacker Infrastruc...
How to Render Ransomware Detection and EDR Produ...