Friday - May 16

Sync with the Nolacon ical feed!
Time Speaker(s) Title
10:00 NolaCon 2025 Intro and Opening Remarks
10:30

Steven Nyikos

anonymous

I like to tinker

I Hate Magic: How AI works

A step-by-step runthrough of the processing steps, software and hardware involved in training and using an AI model, …

11:00

Jonathan Fischer

anonymous

Jonathan Fischer is a hardware, RF, and IoT security enthusiast that spent a decade in operational technology before …


Matthew Richard

anonymous

Matthew Richard is a software developer that enjoys coding in low level languages. His favorite text editor is Neovim. …

The Ghost in the Keyboard

As advances in endpoint protection, AI/machine learning, and attack detection continue to bolster defenses, …

12:00 Lunch
13:00

Alex Holden

anonymous

Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in …

Why I Go to the Dark Web Every Day

The Dark Web is a scary place. In order to deter the cybercrime, I feel confident exploring its dangerous grounds and …

14:00

Phil Brass

images/image.jpeg

Phil Brass started in the security industry in 1998 at for Internet Security Systems, and has been a member of the …

Pentest Quality Assurance

As a consumer of technical security testing services, how can you get the best security testing? If you’re …

15:00

Evan Kirstein

images/evan.jpeg

Evan is a passionate Information Security professional with over 10 years of IT and Cybersecurity experience, including …

Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget

Landing a job requires experience. But how do you get Kobe beef experience without a job or shift gears in your …

16:00

Joshua Crumbaugh

anonymous

Joshua Crumbaugh is one of the world’s leading security awareness experts and a world-renowned cyber security …

Mind Hacks Exposed: 11 Ways to Engineer a Human Firewall

What if you could harness the same psychological tactics hackers use‚ only this time, for good? In this session, ethical …

17:00 Happy Hour with Open Bar

Saturday - May 17

Time Speaker(s) Title
10:00

Chris Silvers

images/image.jpg

With more than 25 years of information security experience, Chris Silvers, CISSP, MBA, is the Founder and Principal …

Keynote: The Long and Winding Alley: Social Engineering Parables

Take a journey with us down a dark road, into a back access alley and the after-hours loading dock of an unsuspecting …

11:00

Evil-Mog (Dustin Heywood)

images/image.jpeg

EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …

Fast Hash Cracking Methodologies with Hashcat

This talk will cover an overview of effective hash cracking methodologies with theory and demo for hashes such as NTLM, …

12:00 Lunch
13:00 Talk Roulette
14:00

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

The Whole is more Dangerous than the Sum of its Parts

Damon “ch3f” Small will discuss a real-world, complex attack-chain scenario. This will demonstrate how …

15:00

Luke McOmie

images/image.jpeg

Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …


Ryan Jones

Panel

We drink and tell cool stories about us doing stuff

16:00

Raymond Evans

images/photo.png

Raymond Evans is a security researcher having 9+ years of experience in cyber security. He has been working with …

Navigating Challenges in Physical Penetration Testing: The Rise of New Tools Beyond the USB Rubber Ducky

Physical penetration is critical to security assessments, providing invaluable insights into an organization’s …

Sunday - May 18

Time Speaker(s) Title
10:00

Mansoor Ahmad

anonymous

Mansoor Ahmad is an offensive security professional who has always had a curiosity about how things worked. While in …

Hacking the First Amendment: A press photographer's perspective on Red Teaming scenarios

In this engaging talk, we explore how a press photographer’s unique perspective enhances our understanding of red …

10:30

Allyn Stott

images/whyallyn.png

Allyn Stott is a senior staff engineer at Airbnb where he works on the InfoSec Technology Leadership team. He spends …

Futile Efforts: A Decade in InfoSec

Your efforts are futile. Long hours, high stress, constant conflict, and burnout-for what? So your cloud team can expose …

11:00

Matthew Wollenweber

images/IMG_4466.jpeg

Matthew Wollenweber (@MWollenweber) is a security engineer at Axonius. He has over 20 years experience as a …

Reducing Friction in Political Action

As America marches ever closer to fascism, people are scared. Activism can offer cathartic relief and affect real …

11:30

Devan Fendlason

anonymous

Devan Fendlason is a graduate student at Delgado Community College, where she studied Cybersecurity and has earned the …

Struggles of a New Orleans Newbie: Breaking into CyberSecurity

How do you hack into cybersecurity? I had a job that only led to death, Hospice Assistant, I needed a change. There was …

12:00 NolaCon 2025 Closing Remarks and Awards
Register Today!