KEYNOTE
Jeff Moss
HACKING GOVERNMENT BUREAUCRACY
Greg Conti
ADVANCED DCO TECHNIQUES - A DIFFERENT WAY TO HUNT
James B. Thomas
WHY CRACK PASSWORDS WHEN YOU CAN JUST RELAY?
Octavio Paguaga, Chris Luecke
AWS NITRO SECURITY ARCHITECTURE
Mark Ryland
THE WILD WEST OF WASM: IS WEB ASSEMBLY A NEW FRONTIER FOR MEMORY CORRUPTION EXPLOITS?
Tom Dignan
PANEL DISCUSSION: KEEPING THE “I” IN “TEAM”: BRIDGING THE MILITARY AND HACKER CULTURES
MG Stephen Hager, Rachel Wilson, Kate Fazzini, John Hultquist
KERBEROS ABUSE: A RECAP OF THE THREE-HEADED DOG
Alberto Jose RodriguezSanchez
REPRODUCIBLE, VERSION-CONTROLLED IMAGE CREATION
Speaker TBA
FEEDBACK - IMPORTANCE IN CYBER, INTEL AND MENTAL HEALTH LIFE CYCLES
Garrett Guinivan
WEAPON OF MASS DESTRUCTION: A LOOK AT THE RANSOMWARE EPIDEMIC
Fernando Tomlinson
SCADA SPLUNK: A STOP-GAP SOLUTION TO PROCESS VARIABLE ANOMALY DETECTION
Jake A. Coyne
AUTODYNE: RAPID IOT FIRMWARE EMULATION FOR THE DISCERNING PROFESSIONAL
José Fernández
PUTTING THE "ACT" IN OODA: SPLUNK SUPPORT TO DOD CYBER OPERATIONS
Sabrina Lea, Josh Hoge
RANSOMWARE BY THE NUMBERS - SCRIPT-DRIVEN ATTACKS BY DHARMA RAAS ACTORS (AND OTHERS)
Sean Gallagher
BLOCKCHAIN - SLOWLY, THEN ALL AT ONCE
Joshua Jenkins
AUTOMATING YOUR PERSONA OPS - TOOLS TO CREATE YOUR OWN TROLL FARM
CARS CAN BE SECURE OR: HOW TO STOP WORRYING AND MAKE ICS UNHACKABLE FOR < $5
Brent Stone, Ken Tindall
TECHNIQUES FOR COVERT COMMUNICATIONS WITHIN WINDOWS
John C. Geenty III
A SURVEY OF THE ADDITIVE MANUFACTURING CYBER KILLCHAIN
TITLE TBA
BETTER BEST PRACTICES
Rock Stevens
RAPID DEVELOPMENT FOR EMERGENCY RESPONSE SCENARIOS
Matthew Wagner
Jinny Yan
AN ANALYSIS OF THE STRATEGIC AND TACTICAL RISKS OF CYBERATTACK AGAINST UNMANNED GROUND VEHICLES (UGVS)
KNOW WHERE TO GO: USING GO FOR CYBER SECURITY
Leo St. Amour
AN INTRODUCTION TO APRS
Evan Natter
Joshua Miller
INDICATORS OF TARGETING - INDICATORS OF COMPROMISE VS INDICATORS OF ATTACK
Sean Adams
THANKS SPACEX! CLIENT-SIDE JAVASCRIPT FOR THE WIN!
Stephen Willson
BREAK
CLOSING REMARKS
Andreas Kellas