Schedule

.:friday:.

.:training:.

10:00 AM – 6:00 PM Hands-on pentesting bootcamp — Georgia Weidman
1:00 PM – 7:00 PM Hacking the raspberry pi — Branden Williams / FrankTheTank
1:00 PM – 7:00 PM From Data to Intelligence – Deriving Predictive Insights with OSINT — Steven Fox
1:00 PM – 5:00 PM Hacking the Hustle Hands-On – Infosec Resume and Career Strategies Workshop — Eve Adams

.:track 1:.

9:30 AM – 10:00 AM Conference Opening
10:00 AM – 11:30 AM Keynote — Beau Woods
11:30 AM – 12:50 PM Lunch Break — Track Breakout
1:00 PM – 1:50 PM Containing Privileged Processes with SELinux and PaX and Attacking Hardened Systems — Parker Schmitt
2:00 PM – 2:50 PM Whitelist is the New Black — Damian Profancik
3:00 PM – 3:50 PM Developing a Open Source Threat Intelligence Program — Edward McCabe
4:00 PM – 4:50 PM Blurred Lines: When Digital Attacks Get Physical — Phil Grimes
5:00 PM – 5:50 PM Hackers, Attack Anatomy and Security Trends — Ted Harrington
6:00 PM – 6:50 PM Exploring the Target Exfiltration Malware with Sandbox Tools — Adam Hogan
7:00 PM – 7:50 PM Dinner
8:00 PM – 1:00 AM Late Night Events

.:track 2:.

9:30 AM – 10:00 AM Conference Opening
10:00 AM – 11:30 AM Keynote — Beau Woods
11:30 AM – 12:50 PM Lunch Break — Track Breakout
1:00 PM – 1:50 PM Competitive Hacking: why you should capture the flag — Steve Vittitoe
2:00 PM – 2:50 PM 3 Is a Magic Number (or your Reality Check is About to Bounce) — Edward McCabe
3:00 PM – 3:50 PM The TrueCrypt audit: How it happened and what we found — Kenneth White
4:00 PM – 4:50 PM Seeing Purple: Hybrid Security Teams for the Enterprise — Mark Kikta (Beltface)
5:00 PM – 5:50 PM Eyes on IZON: Surveilling IP Camera Security — Mark Stanislav
6:00 PM – 6:50 PM Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) — Benjamin Brown
7:00 PM – 7:50 PM Dinner
8:00 PM – 1:00 AM TBD

.:saturday:.

.:training:.

10:00 AM – 6:00 PM Hands-on pentesting bootcamp — Georgia Weidman
1:00 PM – 6:00 PM Hacking the raspberry pi — Branden Williams / FrankTheTank
10:00 AM – 4:00 PM From Data to Intelligence – Deriving Predictive Insights with OSINT — Steven Fox
10:00 AM – 4:00 PM Hacking SCADA, ICS, and Embedded Devices for the Lulz – Deconstructing CVE-2013-2802 — Essobi

.:track 1:.

9:00 AM – 9:50 AM Agile Defensive Technologies — Robert Johnston
10:00 AM – 10:50 AM Moving the Industry Forward – The Purple Team — David Kennedy
11:00 AM – 11:50 AM Software Assurance Marketplace (SWAMP) — Von Welch
12:00 PM – 12:50 PM Lunch Break — Track Breakout
1:00 PM – 1:50 PM OWASP Top 10 of 2013: It’s Still a Thing and We’re Still Not Getting It — Barry Schatz
2:00 PM – 2:50 PM Tape Loops for Industrial Control Protocols — K. Reid Wightman
3:00 PM – 3:50 PM OpenAppID: Open Source Next Gen Firewall with Snort — Adam Hogan
4:00 PM – 4:50 PM Challenge of Natural Security Systems — Rockie Brockway
5:00 PM – 5:50 PM InfoSec Big Joke – 3rd Party Assessments — Moey
6:00 PM – 6:50 PM How to create an attack path threat model — Wolfgang Goerlich
7:00 PM – 7:50 PM Dinner — CLOSED FOR ROOM SETUP
8:00 PM – 1:00 AM Saturday Night Events — Rance || YTCracker

.:track 2:.

9:00 AM – 9:50 AM Pending… Update
10:00 AM – 10:30 AM gitDigger: Creating useful wordlists and hashes from GitHub repositories — Jaime Filson
10:30 AM – 11:00 AM Retrocomputing And You – Machines that made the ‘net — Pete Friedman
11:00 AM – 11:30 AM Doge Safes: Very Electronic, Much Fail, WOW! — Jeff Popio
11:30 AM – 12:00 PM Human Trafficking in the Digital Age — Chris Jenks
12:00 PM – 12:50 PM Lunch Break – Track Breakout
1:00 PM – 1:30 PM Keys That Go *Bump* In The Night — Loak
1:30 PM – 2:00 PM How Hackers for Charity (Possibly) Saved Me a LOT of Money — Branden Miller & Emily Miller
2:00 PM – 2:50 PM Ten Commandments of Incident Response (For Hackers) Lesley Carhart
3:00 PM – 3:50 PM Hackers Are People Too — Amanda Berlin
4:00 PM – 4:30 PM Decrypting Communication: Getting Your Point Across to the Masses — Katherine Cook Frye
4:30 PM – 5:00 PM How often should you perform a Penetration Test — Jason Samide
5:00 PM – 5:50 PM Proactive Defense – Eliminating the Low Hanging Fruit — Matt Kelly
6:00 PM – 6:50 PM Active Directory: Real Defense for Domain Admins — Jason Lang
7:00 PM – 7:50 PM Dinner — CLOSED FOR ROOM SETUP
8:00 PM – 1:00 AM Saturday Night Events — Rance || YTCracker

.:sunday:.

.:track 1:.

9:00 AM – 9:50 AM Are You a Janitor or a Cleaner — John Stauffacher / Matt Hoy
10:00 AM – 10:50 AM Ain’t No Half-Steppin’ — Martin Bos
11:00 AM – 11:50 AM ROOM CLOSED FOR SINGLE ROOM TRANSITION
12:00 PM – 12:50 PM Closing Announcements

.:track 2:.

9:00 AM – 9:50 AM Profiling Campus Crime — Chris J
10:00 AM – 10:50 AM Proper Seasoning Improves Taste — James Siegel
11:00 AM – 11:50 AM ROOM CLOSED FOR SINGLE ROOM TRANSITION
12:00 PM – 12:50 PM Closing Announcements