Registration / Check-In 7:00am - 9:00am
The Birds and the PCBs: Where Baby Circuit Boards Come From 9:00am - 1:00pm
How Secure Is This Thing Anyway? A Guide Into Mobile Security and Bug Bounties 1:00pm - 3:00pm
Conference Talk Proposal Writing 101 3:00pm - 5:00pm
Be The Change – She/They Strategies for Ascending to a Level of Tech Influence to Change the World 5:00pm - 7:00pm
Welcome / Opening...
Fixing the Internet’s Auto-Immun... 9:00am - 9:30am
From Novice to Apprentice: How t... 9:30am - 10:00am
Working Remote Can be Overwhelmi... 10:00am - 10:30am
The Way of Security 10:30am - 11:00am
Step 2: Editing, Step 3: Profit 11:00am - 11:30am
Infiltration to effect change fr... 11:30am - 12:00pm
In the wake of an Advanced Persi... 12:00pm - 12:30pm
Scholarships for Women in Cybers... 12:30pm - 1:00pm
The Secret Weapon to Fight InfoS... 1:00pm - 1:30pm
Your Mom Doesn’t Work Here… But... 1:30pm - 2:00pm
Accountability and Ethics in Cybersecurity Practices 2:00pm - 3:00pm
Research at the Speed of News: Lessons Learned Building & Managi... 3:00pm - 4:00pm
Offroading with Test Scripts: Security in QA 4:00pm - 5:00pm
Hackers are Scary: Why the “Stupid User” is Actually just Afraid 5:00pm - 6:00pm
On this journey, where do I go next? 9:00am - 10:00am
DECEPTICONv2: OPSEC and Anti-OSINT for Personal Protection 10:00am - 11:00am
All Aboard: Let’s GoPhish-ing and learn new tricks! 11:00am - 12:00pm
Could Static Code Analysis & Secure Coding have Saved the Death... 12:00pm - 1:00pm
OWASP DevSlop: A DevSecOps Pipeline 1:00pm - 2:00pm
Base64 is not encryption – a better story for Kubernetes Secrets 2:00pm - 3:00pm
It’s Coming From Inside the House: An Inside-Out Approach to Nod... 3:00pm - 4:00pm
Mobile App Parsing – All about that data 4:00pm - 5:00pm
RAWR Panel 5:00pm - 6:00pm
The Quiet Party 7:30pm - 11:00pm
CTF 12:00pm - 10:00pm
Tell Me About Yourself: Perfecting Your Elevator Pitch 9:00am - 10:00am
Backwards and In Heels: You Must Know the Business to Secure the... 10:00am - 11:00am
Call Center Authentication 11:00am - 12:00pm
Why won’t they just get password managers already? User empathy... 12:00pm - 1:00pm
Winning at workplace politics 1:00pm - 2:00pm
Inside Out Security – Building Castles not Warehouses 2:00pm - 3:00pm
Status: Ready – Preparing for your next Infosec Role 3:00pm - 4:00pm
Ethics in Social Engineering – Destroying the Target is Not the... 4:00pm - 5:00pm
We Broke the Code – Now Let’s Rewrite the OS! 5:00pm - 6:00pm
Welcome!
Why my DevOps team likes me again – Intro to k8s Security 9:00am - 10:00am
The relevance of social science to the cybersecurity discourse 10:00am - 11:00am
How Online Dating Made Me Better At Threat Modeling 11:00am - 12:00pm
I’m a hunter! But what does that mean? 12:00pm - 1:00pm
Hacking Brainstems, Mitigating Vulns: Promise from a 0 Day Insid... 1:00pm - 2:00pm
Getting Started with AWS Security 2:00pm - 3:00pm
Web Application Penetration Testing: An Introductory Workshop fo... 3:00pm - 4:00pm
Please don’t hate me, but I need... 4:00pm - 4:30pm
Hacking Humans: Addressing Vulne... 4:30pm - 5:00pm
Is it time to think about Incident Response differently? 5:00pm - 6:00pm
How to lose a container in 10 mi... 9:00am - 9:30am
Stranger Things: Data Driven Inc... 9:30am - 10:00am
Is Your Period Tracker App Leaki... 10:00am - 10:30am
CTI AfterDark 10:30am - 11:00am
Mythbusters: Cyber Threat Intell... 11:00am - 11:30am
Sneaky Wi-Fi Networks Stealing Y... 11:30am - 12:00pm
“Ain’t Nobody Got Time For That!”: Understanding Algorithmic Gam... 12:00pm - 1:00pm
Attacking & Defending AWS S3 Bucket 1:00pm - 2:00pm
Hacking Modern Webapps 2:00pm - 3:00pm
Exploiting Data Subject Access Rights under New Privacy Laws 3:00pm - 4:00pm
Exploiting Web Apps: Hands-On 4:00pm - 5:00pm
Automating security operations i... 5:00pm - 5:30pm
Hacking the signals: From a Prac... 5:30pm - 6:00pm
The Not Quiet Party 7:30pm - 11:00pm