Time
1:30 PM
2:00 PM
2:30 PM
3:00 PM
3:30 PM
4:00 PM
4:30 PM
5:00 PM
5:30 PM
6:00 PM
6:30 PM
7:00 PM
7:30 PM
8:00 PM
8:30 PM
9:00 PM
9:30 PM
10:00 PM
2:00 AM
Circle
OPENING CEREMONY
KEYNOTE: Cameras.ICU
Closed
Meet Security Planner (Or: How to Help Your N…
How to reverse engineer your cyber security c…
Needle in the Hay: A Guide to Discovering Pla…
GUR RIBYHGVBA BS PELCGBTENCUL
A World Without Passwords
A “Brazillian” Different Kinds of Malware…
World War II versus Modern Day Cryptography
Hacking and Defending APIs
Defeating Alarmed Doors
Taking Care of You; Dealing with the cumulati…
AFTERPARTY: Hacker Arcade
Square
Closed
Closed
Exposing the Threat: Uncovering the Hidden Ri…
What’s Right in Cybersecurity
The Call’s Coming from Inside the House: Au…
Offensive Security & The Evolution of At…
Beginner’s Guide to Mobile Applications…
Physical Penetration Testing – Tales Fr…
Are they human or scripts? The level of human…
Hunting Before Day Zero
SQL Injection: A history’ OR 1=1; ̵…
Hot or Not: Offensive Attacks!
Triangle
Closed
Closed
What I learned about hacking and security fro…
Defending Beyond Defense
Creativity 3.0: How Web3 Will Shape The Futur…
Patch? We can’t patch! An Introduction to O…
No Longer a No-Go: How to Safely Scan OT Devi…
Now anyone can become a cellular provider! Ho…
Security Does Not Need To Be Fun: Ignoring OW…
Instantly improve your memory with these five…
New Consciousness Paradigm
Star
Closed
Closed
5 Enterprise Architectures Every Tech Executi…
A Hole In The Boat – How APIs Threaten …
Executives: Overcoming the CyberSecurity Pove…
The dangers of online speech
Agile Security Teams
Ensure Your Cyber Insurance: A 4 phase approa…
How to save your SOC and what can you (or I) …
Your Board Deck Sucks!: Why you can’t g…
Hexagon
Closed
Closed
Hacker 101 Intro
A Week in the Life of a Pentester
Stop, Drop, and Roll: How to Create Easy, Rel…
Bypass 101
The importance of team-based cybersecurity to…
Click here to end the world: Navigating the v…
PCI DSS v4.0 Is Here – Now What?
Achieving a Threat-Informed Defense with MITR…
Defender Advanced Threat Hunting: More than m…
Things Not To Do In Consulting
When management asks you: “Do you accept Ag…
Having a Hacktivism Ethos While Mitigating Un…
OSINT of Physical Sites