--[ Schedule

----[ Conference Schedule (29-30 NOV 2021)

TIME (EST) NOV 29 2021
0900

CRYPTO CHALLENGE

VILLAGES

WORKSHOPS

1200

LUNCH

1300

CRYPTO CHALLENGE

VILLAGES

WORKSHOPS

1600

END OF DAY

TIME (EST) NOV 30 2021
0800

OPENING REMARKS

0815

KEYNOTE

Jen Easterly

0920

CRYPTO CHALLENGE

PRESENTATIONS

VILLAGES

1210

LUNCH

1310

CRYPTO CHALLENGE

AVENGERCON VI PANEL - RANSOMWARE CYBER KILL CHAIN

Sean Gallagher, Azim Khodjibaev, Lesley Carhart, & Dmitry Smilyanets

VILLAGES

1415

PRESENTATIONS

1625

CLOSING REMARKS

1625

END OF EVENT

----[ Presentations Schedule (30 NOV 2021)

  TRACK
TIME (EST) TRACK 1 TRACK 2 TRACK 3
0800

OPENING REMARKS

0815

KEYNOTE

Jen Easterly

0920

HOW WE GOT HERE: THE RISE OF RANSOMWARE

Geo

IT'S ALL FUN IN GAMES

Travis Hartman

LANGUAGES (NOT PYTHON) AND CYBER - LINGUISTS IN THE INFOSEC FIELD

Garrett Guinivan

0955

EVALUATING AVIATION CYBERSECURITY THROUGH A LIFECYCLE PERSPECTIVE

John Davis

PRACTICAL ONLINE PRIVACY

Alex Master

1010

ANDROID PENTESTING AND SOCIAL ENGINEERING

Dr. Ace

1030

NOT ON MY BOX: LOW-COST, HIGH-YIELD TECHNIQUES AND SERVICES FOR RANSOMWARE ANALYSIS WITHIN SANDBOXED ENVIRONMENTS

José Fernández

1045

PROTECT YOURSELF FROM GAMER INPUT

Rob Guiler

UNLOCKING THE COMPARTMENTS

Josh Bundt

1120

THREAT INTELLIGENCE AND SPLUNK AT USCYBERCOM

Josh Hoge

SELLING CYBER: HOW TO ENGAGE SENIOR LEADERS AND BUILD A VILLAGE TO ACHIEVE YOUR GOALS

Chuck Weissenborn

1135

LINUX NETWORK NAMESPACES FOR PRIVACY

Stephen Hart

1210

LUNCH

1230

TRIAGE TOURNAMENT

Paul Battista

1305

LUNCH

1310

AVENGERCON VI PANEL - RANSOMWARE CYBER KILL CHAIN

Sean Gallagher, Azim Khodjibaev, Lesley Carhart, & Dmitry Smilyanets

1415

UNDERSTANDING THE CYBER THREAT INTELLIGENCE (CTI) PROCESS

Brad E. Rhodes

BREAKING DOWN THE BUZZWORDS: DEVOPS AND AGILE IN THE CYBERSECURITY COMMUNITY

Olivia Brundage & Eric Koch

BREAK

1435

WRITING SHELLCODE FOR LINUX IN C

Jacob Heybey

1450

INTO THE BREACH: AN ANALYSIS OF POLITICAL PARTY ACCOUNT EXPOSURE

Andrew Schoka

1505

BACK TO BASICS: WHY YOUR $10 MILLION SIEM WON'T STOP THE BAD GUYS

Mark Klink

1510

DRAGONSDR AND DRAGONOS OPEN-SOURCE DIGITAL SIGNAL PROCESSING

cemaxecuter

1525

THREAT HUNTING WITH ATT&CK

Antonia Feffer

INSIGHTS INTO FOREIGN SCADA BOTS PROBING US OT ASSETS

Philip Trainor

1545

WARNING - PYTHON CAN BE POISONOUS: THE SECURITY OF PYTHON PACKAGES

John Speed Meyers

1600

UNDERSTANDING THE CYBER DIRECT COMMISSION PROCESS (CDCP)

Robert Jaramillo

1605

LONG RANGE WI-FI OVER HAM RADIO

Evan Natter

1615

BREAK

1620

BREAK

1625

CLOSING REMARKS

1635

END OF EVENT