0800 |
OPENING REMARKS
|
0815 |
KEYNOTE
Mudge, Sarah Zatko
|
0920 |
ARMCHAIR CYBERWARRIORS: 6 MONTHS OF CYBERCRIMINAL AND HACKTIVIST ACTIVITIES RELATED TO THE RUSSIAN WAR IN UKRAINE
Alexander Leslie
|
PAI OPERATIONS: EVERYONE CAN SEE WHAT LIVES BEYOND YOUR NETWORK BOUNDARY
Jared W. Dible
|
LEARNING FROM THE MISTAKES OF OTHERS: INCIDENT RESPONSE EDITION
Luke Pearson
|
0955 |
RANSOMWARE: BROKERING INITIAL ACCESS
Trevor Hilligoss, CW Walker
|
1010 |
BREAKING GRAPHQL
Grant Smith
|
COVERTLY INFILTRATING AND MONITORING C&C SERVERS
Jonathan D. Fuller
|
1045 |
QUANTUM ENCRYPTION IN A CLASSICAL INTERNET
Hamilton T. Bonds
|
THREAT MODELING INTERNET CENSORSHIP: TOWARDS EVALUATION OF MANAGED ATTRIBUTION SOFTWARE
Alexander Master
|
THE SLIVER LINING: UNDERSTANDING THE C2 FRAMEWORK FOR BLUE TEAM
TBA
|
1120 |
TBA
hzxf
|
CYBER THREAT INTELLIGENCE ON THE DEEP AND DARK WEB
Allen Britt
|
POST-QUANTUM CRYPTOGRAPHY AND U.S. GOVERNMENT ACTIVITIES
Samuel Crislip
|
1140 |
CYBER DOMAIN DOMINANCE: WHO HAS IT, HOW TO GET IT AND HOW TO KEEP IT
Gentry Lane
|
BRIGHTEN UP THE IDEAL SKY: AN INSIDE VIEW OF CHARMINGKITTEN'S HOLISTIC SUPPORT TO IRGC OPERATIONS
Joshua M. Miller
|
1155 |
KINETIC CYBER EFFECTS FOR THE WIN
Brad Rhodes
|
1215 |
WHY WON'T U BOOT?
Ryan Greer
|
FUTURE ARMY SECURITY CAPABILITIES FROM THE CYBER SECURITY COLLABORATIVE RESEARCH ALLIANCE
Trent Jaeger
|
1245 |
BREAK
|
1250 |
PANEL
Katie Moussouris, TJ O'Connor, Colin Ahern
|
1355 |
TALENT MANAGEMENT IN A COMPETITIVE WORLD
Ian S. Frist
|
SEMANTIC HYPERGRAPHS MAY WIN THE NEXT WAR
Brandon Gonzalez
|
THE FUTURE OF DEFENSIVE CYBER OPERATIONS
John Black, Henry Coller, Chris Wild, David Vaughn
|
1445 |
CREATING A CUSTOM MACHINE LEARNING OBJECT DETECTION MODEL WITH YOLOV5
Jack M. Graham
|
HACKING DEVOPS
Phillip Marlow
|
JOINT SERVICES TALENT RECRUITMENT
Brandon Cea, Gabriel Menchaca
|
1505 |
PROTECT YOURSELF FROM GAMER INPUT II
Rob Guiler
|
1520 |
MEDIA EFFECTS USED IN INFLUENCE OPERATIONS
Krassimir Tzvetanov
|
MFA IS NOT ENOUGH!
Dmitry Smilyanets
|
1540 |
BIRDBOX: IF YOU SEE IT, IT'S ALREADY TOO LATE
George Sieretzki
|
1555 |
(BACK) INTO THE BREACH: POLITICAL PARTY ACCOUNT EXPOSURE AND WHY IT MATTERS
Andrew Schoka
|
LARGE SCALE SENTIMENT MODIFICATION CAMPAIGN CREATION WITH OPEN SOURCE TECHNOLOGY
Mike Reid
|
1630 |
BREAK
|
BREAK
|
1635 |
BREAK
|
1645 |
CLOSING REMARKS
|
1700 |
END OF EVENT
|