Registration/coffee 8:00am - 9:00am
Opening remarks
Navigating the Alternative Facts of Malware Prevention 9:00am - 10:00am
Target-based Security Model: Mapping Network Attacks to Security... 10:00am - 11:00am
Quick and Dirty Malware Analysis for the Rest of Us 11:00am - 12:00pm
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restau... 12:00pm - 1:30pm
50 Shades of Graylog 1:30pm - 2:30pm
Security in Mergers and Acquisitions (M&A) 2:30pm - 3:30pm
Operational Security in a Weaponized World 3:30pm - 4:30pm
Becoming a strategic cybersecurity leader 4:30pm - 5:30pm
Fire Marshal talks, networking and party: OFF-SITE at Casa Chapala 6:00pm - 8:00pm
SniffAir – An Open-Source Framework for Wireless Security Assess... 9:00am - 10:00am
Inside a Breach: Lesson Learned 10:00am - 11:00am
Thinking outside the security box: Assembling non-traditional se... 11:00am - 12:00pm
The Human Pentest 1:30pm - 2:30pm
Hiding in the Clouds - Leveraging cloud infrastructure to evade... 2:30pm - 3:30pm
How (Not) to Patch Command Injection Bugs 3:30pm - 4:30pm
Building an Empire with (Iron)Python 4:30pm - 5:30pm
Containers: It’s Not Your Mamas Tupperware 9:00am - 10:00am
Security Development: Going Beyond the Tool 10:00am - 11:00am
Career and Job Search Tips 11:00am - 12:00pm
Security instrumentation: Be the hero getting value from securit... 1:30pm - 2:30pm
Rise of the Machines 2:30pm - 3:30pm
Choose Your Own Adventure: A Career Guide to InfoSec 3:30pm - 4:30pm
Develop the Best: Artifact Based Mentoring for Security Engineer... 4:30pm - 5:30pm
Registration/coffee 8:30am - 9:00am
KEYNOTE: Next gen CTFs: Integrating blue-team oriented and live... 9:00am - 10:00am
Compromise Assessments: Best Practices & Lessons from the Field 10:00am - 11:00am
Credential Stealing Emails - What you need to know 11:00am - 12:00pm
Peering into the Abyss - Understanding the dark side of Uninitia... 1:30pm - 2:30pm
Enhancing SOC1 by using feedback loops 2:30pm - 3:30pm
A story of writing malware for 5 years 3:30pm - 4:30pm
Closing ceremonies 4:30pm - 5:30pm
Caught my WebApp cheating on me! 10:00am - 11:00am
A day in the life of a pentester 11:00am - 12:00pm
Make Vishing Great Again 1:30pm - 2:30pm
Research Baron 2:30pm - 3:30pm
Metasploit Minus Metasploit 3:30pm - 4:30pm
Introduction to Smart Cards and leveraging them in attacks 10:00am - 11:00am
Privacy Management and the GDPR 11:00am - 12:00pm
ELK - Not Just for Application Logging 1:30pm - 2:30pm
Post-mortem on deploying osquery, Kolide, and writing to kinesis 2:30pm - 3:30pm
Strengthen Your SecOps Team by Leveraging Neurodiversity 3:30pm - 4:30pm