--[ Schedule (01 DEC 2022)

  TRACK
TIME (EST) TRACK 1 TRACK 2 TRACK 3
0800

OPENING REMARKS

0815

KEYNOTE

Mudge, Sarah Zatko

0920

ARMCHAIR CYBERWARRIORS: 6 MONTHS OF CYBERCRIMINAL AND HACKTIVIST ACTIVITIES RELATED TO THE RUSSIAN WAR IN UKRAINE

Alexander Leslie

PAI OPERATIONS: EVERYONE CAN SEE WHAT LIVES BEYOND YOUR NETWORK BOUNDARY

Jared W. Dible

LEARNING FROM THE MISTAKES OF OTHERS: INCIDENT RESPONSE EDITION

Luke Pearson

0955

RANSOMWARE: BROKERING INITIAL ACCESS

Trevor Hilligoss, CW Walker

1010

BREAKING GRAPHQL

Grant Smith

COVERTLY INFILTRATING AND MONITORING C&C SERVERS

Jonathan D. Fuller

1045

QUANTUM ENCRYPTION IN A CLASSICAL INTERNET

Hamilton T. Bonds

THREAT MODELING INTERNET CENSORSHIP: TOWARDS EVALUATION OF MANAGED ATTRIBUTION SOFTWARE

Alexander Master

THE SLIVER LINING: UNDERSTANDING THE C2 FRAMEWORK FOR BLUE TEAM

TBA

1120

TBA

hzxf

CYBER THREAT INTELLIGENCE ON THE DEEP AND DARK WEB

Allen Britt

POST-QUANTUM CRYPTOGRAPHY AND U.S. GOVERNMENT ACTIVITIES

Samuel Crislip

1140

CYBER DOMAIN DOMINANCE: WHO HAS IT, HOW TO GET IT AND HOW TO KEEP IT

Gentry Lane

BRIGHTEN UP THE IDEAL SKY: AN INSIDE VIEW OF CHARMINGKITTEN'S HOLISTIC SUPPORT TO IRGC OPERATIONS

Joshua M. Miller

1155

KINETIC CYBER EFFECTS FOR THE WIN

Brad Rhodes

1215

WHY WON'T U BOOT?

Ryan Greer

FUTURE ARMY SECURITY CAPABILITIES FROM THE CYBER SECURITY COLLABORATIVE RESEARCH ALLIANCE

Trent Jaeger

1245

BREAK

1250

PANEL

Katie Moussouris, TJ O'Connor, Colin Ahern

1355

TALENT MANAGEMENT IN A COMPETITIVE WORLD

Ian S. Frist

SEMANTIC HYPERGRAPHS MAY WIN THE NEXT WAR

Brandon Gonzalez

THE FUTURE OF DEFENSIVE CYBER OPERATIONS

John Black, Henry Coller, Chris Wild, David Vaughn

1445

CREATING A CUSTOM MACHINE LEARNING OBJECT DETECTION MODEL WITH YOLOV5

Jack M. Graham

HACKING DEVOPS

Phillip Marlow

JOINT SERVICES TALENT RECRUITMENT

Brandon Cea, Gabriel Menchaca

1505

PROTECT YOURSELF FROM GAMER INPUT II

Rob Guiler

1520

MEDIA EFFECTS USED IN INFLUENCE OPERATIONS

Krassimir Tzvetanov

MFA IS NOT ENOUGH!

Dmitry Smilyanets

1540

BIRDBOX: IF YOU SEE IT, IT'S ALREADY TOO LATE

George Sieretzki

1555

(BACK) INTO THE BREACH: POLITICAL PARTY ACCOUNT EXPOSURE AND WHY IT MATTERS

Andrew Schoka

LARGE SCALE SENTIMENT MODIFICATION CAMPAIGN CREATION WITH OPEN SOURCE TECHNOLOGY

Mike Reid

1630

BREAK

BREAK

1635

BREAK

1645

CLOSING REMARKS

1700

END OF EVENT