Keynotes
- F. Paul Greene
- Johnny Xmas
- Reg Harnish
Incident Response Track
- Practical Incident Response: An Interactive Tabletop Exercise (John D. Flory III, Bruce Cheney, Chandra Whitley, Jenny Holmes)
- Establishing an Incident Response Plan (Michael McCartney)
- Business Continuity & Disaster Recovery Interactive Tabletop Presentation (Carl Benevento, Bo Jayakumar)
Cybersecurity Management Track
- Perspectives on Establishing “Cyber Confidence” (Tom Podnar)
- Planning Successful Red Team Operations (Joe Christian)
- A Theme of Fear: Hacking the Paradigm (Dr. Catherine J. Ullman)
- We’re All Winners: Gamification and Security Awareness (Ben Woelk)
Risk Remediation & Security Controls Track
- Leveling Up Your Entire Security Program (Not Just DFIR) With ATT&CK (Bob Rudis)
- Lessons from the Orange Book (David Frier)
- Data Privacy is a Human Right (Jason Woodson)
- Cyber-Physical Safety (Duncan Sparrell)
OWASP Track
- Secure Your Web Apps by Training Developers to Break Them (Jim Keeler)
- Hands-On Advanced Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
Threats & Threat Hunting Track
- Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning (Matthew Wright)
- Supercharge your SOC with 3 Killer Threat Hunting Use Cases (Patrick Keenan)
- The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive (Matthew Gracie)
- Supercharged SIEM: Empowering your logs with the right data (Tom Kopchak)
- Threat Hunting: The Incredible Journey (Zach Bevilacqua)
Technical Track
- Smartphone security evaluation in the era of Big Data (Igor Khokhlov, Leon Reznik)
- Endpoint Visibility with Osquery and Loki (George Adams, Ed Welch)
- Kubernetes Security Tools and Pentesting Methodology (Mark Manning)
- PErfidious: Make PE backdooring great again! (Shreyans Devendra Doshi)
- How to harden a medical device – It’s easier than you think (Dan Megalo)