Track 1
Weaponizing Your Pi
9:00 - 9:50
Red Team Tactics for Cracking the GSuite Perimeter
10:00 - 10:50
ARMaHYDAN - Misadventures of ARM Instruction Encodings
11:00 - 11:50
Lunch Break
12:00 - 13:00
Keynote
13:00 - 13:50
Implementing a Kick-Butt Training Program: BLUE TEAM GO!
14:00 - 14:50
Searching the Void - IPv6 Network Reconnaissance
15:00 - 15:50
Wireless Monitoring with the #WiFiCactus
16:00 - 16:30
Closing Ceremony
17:15
Track 2
Bug Bounty: Under the Hood
9:00 - 9:25
Running Laps Around Microsoft's LAPS
9:30 - 9:55
Automation and Open Source: Turning the Tide on Attackers
10:00 - 10:50
Anatomy of an AppSec Program; OR How to Stop Deploying Shoddy Code to Production Systems
11:00 - 11:50
Lunch Break
12:00 - 13:00
Keynote
13:00 - 13:50
Grandma Got Run Over by an Email – Senior Citizens and Computer Security
14:00 - 14:50
Lessons Learned: Emerging Adversary Playbooks
15:00 - 15:50
Quest Accepted
16:00 - 16:30
Closing Ceremony
17:15
Workshops
Workshop: Enterprise Active Directory Attack Playbook for Red and Blue Teams
9:00 - 16:00 (All Day)
Room: TBA
Workshop: Red vs. Blue
9:00-12:30
Room: TBA
Workshop: Finding and Decoding Malicious PowerShell Scripts
14:00-16:00
Room: TBA