Speakers Orators Presenters Lecturers Preachers
Filter
Application Security (AppSec)Artificial Intelligence (AI)BiohackingBlue TeamCareersCloudCold WarDatabasesEncryption & CyphersForensicsGame HackingHacker Culture & MusicHacking 101Hardware & SolderingIncident ResponseInternet of Things (IoT)KeynoteMalwarePassword CrackingPrivacyRed TeamRiskSocial EngineeringThreat IntelligenceVintage Hacking
Hacking Your Perceptions in XR! (XR = VR + AR + MR;)
VR Village Team
Compromise from a Park Bench
Eric Escobar
DigiMarSec: Digital Marketing Security
Joe Cicero
A Script Kiddie’s Guide to Easy Wins
Peter Hoeft
Toto, I’ve a feeling we’re not on a VPN anymore
Jonathan Tomek
FBI Cyber – Imposing Risk and Consequence
Supervisory Special Agent Amanda J. Knutson
Defense on a Budget — Free TTPs for the Blue Team
Robert Wagner
Log4j From the Trenches
Max Thauer
Hacking the Compliance Kernel
Kyle Hinterberg
EHLO is that you?
Dr. Catherine J. Ullman
Badge Panel
TYMKRS, AND!XOR, Compukidmike, & TwinkleTwinkie
Building AIML Driven Virtual Assistants
John Platais
How Ransomware Can Follow You to the Cloud
Kat Traxler
Upsides and Downsides – Finding Your InfoSec Home
Lesley Carhart
CryptoParty Like It’s 1499
Nick Chapel
Brain Hacking – Train Your Brain for Love, Joy and Peace
Dr. Sudesh Kannan
Next Generation Enterprise Security
Josh Bressers
Guerilla Warfare for Blue Team
Rob Carson
Sonic Pi – A Creative Coding Movement for Everyone
Amy Upthagrove
Street Cred: Increasing Trust in Passwordless Authentication
J. Wolfgang Goerlich
The Ethics of Risk
Susan Lincke
What Your Headers Say About You
Bob Lerner
Print Spooler & Petite Potam to Silver Tickets
Dustin Heywood
Mistaken Identity: Protecting OAuth and OIDC
J. Wolfgang Goerlich
Wait, there can’t be only one?
Michael Kavka
Keynote: Stealing Reality? A Deepfakes Redux.
Alyssa Miller
Keynote: Make({Break()};Break(){Make()};
Trenton Ivey