AVENGERCON V

PRESENTATIONS SCHEDULE

  TRACK
TIME (EST) TRACK 1 TRACK 2 TRACK 3
0900 OPENING REMARKS
0910

KEYNOTE

Jeff Moss

1000

HACKING GOVERNMENT BUREAUCRACY

Greg Conti

ADVANCED DCO TECHNIQUES - A DIFFERENT WAY TO HUNT

James B. Thomas

WHY CRACK PASSWORDS WHEN YOU CAN JUST RELAY?

Octavio Paguaga, Chris Luecke

1050

AWS NITRO SECURITY ARCHITECTURE

Mark Ryland

THE WILD WEST OF WASM: IS WEB ASSEMBLY A NEW FRONTIER FOR MEMORY CORRUPTION EXPLOITS?

Tom Dignan

1055

PANEL DISCUSSION: KEEPING THE “I” IN “TEAM”: BRIDGING THE MILITARY AND HACKER CULTURES

MG Stephen Hager, Rachel Wilson, Kate Fazzini, John Hultquist

1125

KERBEROS ABUSE: A RECAP OF THE THREE-HEADED DOG

Alberto Jose RodriguezSanchez

1140

REPRODUCIBLE, VERSION-CONTROLLED IMAGE CREATION

Speaker TBA

1145

FEEDBACK - IMPORTANCE IN CYBER, INTEL AND MENTAL HEALTH LIFE CYCLES

Garrett Guinivan

1205

WEAPON OF MASS DESTRUCTION: A LOOK AT THE RANSOMWARE EPIDEMIC

Fernando Tomlinson

1215

SCADA SPLUNK: A STOP-GAP SOLUTION TO PROCESS VARIABLE ANOMALY DETECTION

Jake A. Coyne

AUTODYNE: RAPID IOT FIRMWARE EMULATION FOR THE DISCERNING PROFESSIONAL

José Fernández

1250

PUTTING THE "ACT" IN OODA: SPLUNK SUPPORT TO DOD CYBER OPERATIONS

Sabrina Lea, Josh Hoge

1255

RANSOMWARE BY THE NUMBERS - SCRIPT-DRIVEN ATTACKS BY DHARMA RAAS ACTORS (AND OTHERS)

Sean Gallagher

1305

BLOCKCHAIN - SLOWLY, THEN ALL AT ONCE

Joshua Jenkins

1325

AUTOMATING YOUR PERSONA OPS - TOOLS TO CREATE YOUR OWN TROLL FARM

Speaker TBA

1340

CARS CAN BE SECURE OR: HOW TO STOP WORRYING AND MAKE ICS UNHACKABLE FOR < $5

Brent Stone, Ken Tindall

TECHNIQUES FOR COVERT COMMUNICATIONS WITHIN WINDOWS

John C. Geenty III

1400

A SURVEY OF THE ADDITIVE MANUFACTURING CYBER KILLCHAIN

Speaker TBA

1415

TITLE TBA

Speaker TBA

1420

BETTER BEST PRACTICES

Rock Stevens

1430

RAPID DEVELOPMENT FOR EMERGENCY RESPONSE SCENARIOS

Matthew Wagner

1440

TITLE TBA

Jinny Yan

1455

AN ANALYSIS OF THE STRATEGIC AND TACTICAL RISKS OF CYBERATTACK AGAINST UNMANNED GROUND VEHICLES (UGVS)

Speaker TBA

1500

KNOW WHERE TO GO: USING GO FOR CYBER SECURITY

Leo St. Amour

1505

AN INTRODUCTION TO APRS

Evan Natter

1515

TITLE TBA

Joshua Miller

1525

INDICATORS OF TARGETING - INDICATORS OF COMPROMISE VS INDICATORS OF ATTACK

Sean Adams

THANKS SPACEX! CLIENT-SIDE JAVASCRIPT FOR THE WIN!

Stephen Willson

1545

BREAK

1600

CLOSING REMARKS

Andreas Kellas