Automating Security Operations Around the Clock 9:00am - 9:45am
Hidden Threats In Your Active Directory Adventur... 10:00am - 10:45am
Digital Certificates: Fails and Flounders 11:00am - 11:45am
Deepfake Deep Dive: Building a Deepfake in Real-... 2:00pm - 2:45pm
Malicious Links, Student Hackers, and a Handful... 3:00pm - 3:45pm
The Cyber Employee Shortage that Wasn't 4:00pm - 4:45pm
Timothy De Block Presents Fun with Phishes 5:00pm - 5:45pm
Vulnerability Exploitation in the Cloud: A Cross... 9:00am - 9:45am
Lessons From a Year in Product Security: Bugs, V... 10:00am - 10:45am
Beyond Compliance:...
How to kill a robo...
KEYNOTE 1:00pm - 1:45pm
An Old Hillbilly's Guide to BASH for Pentests: A... 2:00pm - 2:45pm
From Guardian to Threat: The Double Life of Secu... 3:00pm - 3:45pm
Writing a Modern Assembler 4:00pm - 4:45pm
Liability Landmines: How Lax Security Measures C... 5:00pm - 5:45pm
Share this link via
Or copy link