The following schedule is not final and is still subject to changes
Friday, October 25th, 2024 |
|||
---|---|---|---|
Time | Main Track Smith Ballroom |
Track 2 Rooms TBD |
Workshops Rooms TBD |
8:30 | Registration Opens | ||
9:30 | Opening Remarks | ||
9:45 | **Keynote: ** | ||
10:45 | 15 Minute Break | ||
11:00 | Threat Actors Interest in AI - Separating Hype from Reality | Building a Windows WMI System With No Windows Knowledge | Resume Tuning Workshop |
11:30 | |||
12:00 | Can LLMs Take Our Jobs? AI-Assisted Detection Research | Clearing the FOG: Unveiling the Latest Ransomware Trickery | |
12:30 | What I Learned About Security from Auditing Data Centers | Oops! … I did it again: Security Pitfalls and how to avoid them | |
13:00 | Leave your corporate masters and come work for government! | Building Bulletproof AWS Environments with Secure CDK Constructs | Incident Response for Artificial Intelligence: Playtest New Tabletop Exercises with the AIRCTL Project for fun and stickers |
13:30 | The Badge Talk | Signed, Sealed, Delivered: Ensuring Software Integrity | |
14:00 | Rudder Nonsense: Steering Smart Rowers Off Course | Securing the Future: Tackling Q-day and Leap-day challenges with CodeQL | |
14:30 | |||
15:00 | Bastardo Finale: Wrapping up years of OSINT work chasing professional criminals on the internet | What the Function: A Deep Dive into Azure Function App Security | Roll Your Own EDR/XDR/MDR |
15:30 | |||
16:00 | Asymmetric Impact: Adventures in funding infosec research | Beyond the Hacker Stereotype: Exploring Cybersecurity Careers You Didn’t Know Existed | |
16:30 | Modern Medium Data Pipelines for Breaches, Hacker Style | Using Stardew Valley as a C2 client and infostealer | |
17:00 | Closing Remarks | ||
17:15 | ** ** | ||
18:00 | ** ** | ||
20:30 | Doors close |
Saturday, October 26th, 2024 |
||||
---|---|---|---|---|
Time | Main Track Smith Ballroom |
Workshops A Room TBD |
Workshops B Room TBD |
Workshops C Room TBD |
9:00 | Registration Opens | |||
9:30 | Opening Remarks | |||
9:45 | **Keynote: ** | |||
10:45 | 15 Minute Break | |||
11:00 | ORDER NOW! Using Infomercials to Make Better Presentations | Capture The Flag (CTF) With Feedback | Intro to Generative AI security | ThreatShop: Intro to Web Vulnerabilities |
11:30 | Breaking Build: Red Teaming CI/CD Pipelines and GitHub Actions | |||
12:00 | ||||
12:30 | CI/CD jobs don’t care about US budget cuts: why mirroring software vulnerability data matters | |||
13:00 | There is no Purple just a good relationship between Red and Blue | |||
13:30 | Graphing the Insider: Innovative Applications of GNNs in Insider Threat Detection | So you’d like to present at a conference | An Introduction to Generative Security Applications | Visualizing memory allocations with Windbg and p5.js |
14:00 | ||||
14:30 | Your vuln wasn’t patched: Life on the Blue Team or how I learned stopy worrying and love the risk | |||
15:00 | Canary Tokens - why and how to implement them and related gotchas | |||
15:30 | ||||
16:00 | Closing Remarks | |||
16:15 | BSIDES Portland 2025 Planning begins |