fbpx Skip to main content

Incident Response

2023

KEYNOTE: Cameras.ICU

Jonathan Tomek & Cory Kujawski

Needle in the Hay: A Guide to Discovering Plaintext Credentials in Enterprise Environments

Ben Burkhart

Click here to end the world: Navigating the vulnerability hype cycle.

Jonathan Rogers

ATT&CKing Unicorns

Matthew Lange & Gary Lobermier

Defender Advanced Threat Hunting: More than meets the Eye

Michael "Shecky" Kavka

A Hole In The Boat – How APIs Threaten Everything

Richard Bird

A World Without Passwords

Andy Jaw

A “Brazillian” Different Kinds of Malware and Why Your Organization Should Care

Jared Peck

GUR RIBYHGVBA BS PELCGBTENCUL

Mr. Jeff Man

The Call’s Coming from Inside the House: Authentication Proxy Attacks: Detection, Response and Hunting

Chris Merkel

The importance of team-based cybersecurity tournaments

Andrew Paullin

Offensive Security & The Evolution of Attack Path Management

Joe Mondloch

How to save your SOC and what can you (or I) do to help?

Peter Wlodarczyk

Hacking and Defending APIs

Robert Wagner

Hunting Before Day Zero

Ryan LaBouve

Achieving a Threat-Informed Defense with MITRE ATT&CK

Ben Opel

No Longer a No-Go: How to Safely Scan OT Devices in Critical Environments

Chris Kirsch

Are they human or scripts? The level of human involvement behind RDP brute-force attacks

Andréanne Bergeron, Ph.D

Exposing the Threat: Uncovering the Hidden Risks to Your Cable Modem Security

Daniel Walters

Voiding your warranty, a wireless journey.

Eric Escobar

Command & Control: Malware Deobfuscation via Phishing

Robert Lerner

How to look good when followed by the FSB (KGB)

Rob Carson and Jay Carson

How The Sausage is REALLY Made: CloudOps for Red Teamers

John Ventura

Hot or Not: Offensive Attacks!

Travis Kaun

Patch? We can’t patch! An Introduction to OT/ICS Systems

Luciano Moretti

Secret Handshake: A Mutual TLS Based C2 Communication Channel

John Conwell

Watching the Watchers – Analyzing URL Scanning Solutions at Scale

Nicholas Anastasi

Security Does Not Need To Be Fun: Ignoring OWASP To Have A Terrible Time

Dwayne McDaniel

Defending Beyond Defense

Catherine Ullman

AI for Red Team and Malware Development

Kirk Trychel

Evading EDR by DLL sideloading with C#

Gary Lobermier

You’ve Got Mail (and Misdirected Funds): A Demo of Business Email Compromise

Drew Hjelm

PCI DSS v4.0 Is Here – Now What?

Kyle Hinterberg

Now anyone can become a cellular provider! How anyone can build their own cellular network and how I built one for Milwaukee

Russell From

What’s Right in Cybersecurity

Matteo Rebeschini

Extra description