Discord
Merch Store
About CactusCon
What We Do
Code of Conduct
Team
CactusCon 13 (2025)
CC13 Keynotes
Talks & Schedule
Sponsors
CC13 Venue
Villages & Events
Previous Years
CC12 Keynotes (2024)
CC12 (2024)
CC11 Keynotes (2023)
CC11 (2023)
CC10 Keynotes (2022)
CC10 (2022)
CC9 (2021)
Discord
Merch Store
About CactusCon
What We Do
Code of Conduct
Team
CactusCon 13 (2025)
CC13 Keynotes
Talks & Schedule
Sponsors
CC13 Venue
Villages & Events
Previous Years
CC12 Keynotes (2024)
CC12 (2024)
CC11 Keynotes (2023)
CC11 (2023)
CC10 Keynotes (2022)
CC10 (2022)
CC9 (2021)
CactusCon
CactusCon13
February 14-15, 2025
Mesa, AZ
2019 Talks
2019 Talks and Workshops
Tracie Martin
The Spy Who Liked Me: Grooming and Recruiting Assets in the Age of Social Media
Tracie Martin
Tracie Martin
Colin Estep
Exploiting IAM in GCP
Colin Estep
Colin Estep
Lojikil
Return to the Hundred Acre Woods, what I've learnt in 3 years, or, 3 Eeyore 5 You
Lojikil
Lojikil
John Downey
Cryptography Pitfalls
John Downey
John Downey
Ryan Benson
Extract and Visualize Data from URLs using Unfurl
Ryan Benson
Ryan Benson
Daniel Chun
,
Steve Rasch
APT33: A Case Study on Current Geopolitical Tensions and Cyber Espionage
Daniel Chun
,
Steve Rasch
Daniel Chun
,
Steve Rasch
Samantha K.
The Impact and Standards of Data Protection Regulations
Samantha K.
Samantha K.
Pax Whitmore
Paying for Risk: How to Stay Objective in a Subjective World
Pax Whitmore
Pax Whitmore
John Freimuth
Tunneling to Freedom
John Freimuth
John Freimuth
Jimi Sebree
Automated Dylib Hijacking
Jimi Sebree
Jimi Sebree
Nick Biasini
,
Edmund Brumaghin
Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks
Nick Biasini
,
Edmund Brumaghin
Nick Biasini
,
Edmund Brumaghin
moloch
,
ronan
Designing Secure Implants
moloch
,
ronan
moloch
,
ronan
Rijnard van Tonder
Bug Hunting with Structural Code Search
Rijnard van Tonder
Rijnard van Tonder
Witch
One If By Land, Two If By Uber - Lessons Learned From the Worst Physical Assessment Ever
Witch
Witch
Destruct_Icon
Hacking Your Anxiety
Destruct_Icon
Destruct_Icon
Joe Giron
Owning a Security Camera
Joe Giron
Joe Giron
Andy Jordan
Overcoming the 3 Common Failures Within Vulnerability Management Programs
Andy Jordan
Andy Jordan
Jeremy Lacomis
DIRE: Renaming Variables in Decompiled Code with Neural Nets
Jeremy Lacomis
Jeremy Lacomis
Ankur Chowdhary
Deception-NET: Build Your Own Deception
Ankur Chowdhary
Ankur Chowdhary
Kimber Duke
Threat Hunting Like a Scientist
Kimber Duke
Kimber Duke
Brianne Hughes
How To Write Like It's Your Job
Brianne Hughes
Brianne Hughes
Yael Grauer
,
David Huerta
Worst-of Cybersecurity Reporting 2019
Yael Grauer
,
David Huerta
Yael Grauer
,
David Huerta
Jayme Hancock
Effective Phishing with GoPhish
Jayme Hancock
Jayme Hancock