Click talks for more details


Day 1

5:30 pm | Registration Opens

6:30 pm | Opening Remarks

7:00 pm | Robert Simmons -- Comparing Malicious Files

8:00 pm | Jason Haddix, Chloe Messdagh, and 2 Anonymous hunters -- BountyCraft: The Panel

9:00 pm | Elrey -- RedOps: Automating your Red Team

10:00 pm | Maverick -- Much Ado About Credential Stuffing


Day 2

10:00 am | Chloe Messdaghi -- How to fix the Diversity Gap in Cybersecurity

11:00 am | Sm0key -- Detection and Exploitation of Amplification Attacks in the Wild

12:00 pm | ** Lunch Break - Meals not Provided **

1:00 pm | Scott Rodgers and Cory Hefner -- Phish Finder: Can Machine Learning Identify a Phishing Attack?

2:00 pm | James Morris -- Breaking into Banks like a Boss

3:00 pm | Stuart McMurray -- In and Out the DNS Tunnel

4:00 pm | Lawrence Teo -- Writing Exploit-Resistant Code with OpenBSD

5:00 pm | ** Dinner Break - Meals not provided **

7:00 pm | Tom Holt -- How Underground Vendors Advertise Product in Cybercrime as Service Markets

8:00 pm | Hacker Jeopardy


Day 3

10:00 am | MyProjectExpert -- Getting started with Powershell and One Tool to Hack them All

11:00 am | Brandon Martin -- Was I supposed to mix the security in before baking?

12:00 pm | ** Lunch Break - Meals not Provided **

1:00 pm | _hyp3ri0n -- WhoBuntu: Privacy in a Feature-Rich Environment

2:00 pm | Mike and Michelle Hodges -- Build it, Buy it, or Both? Taking an Engineered-Focused Approach to Security Tooling

3:00 pm | Annoucement of Contest Winners and Closing Remarks