I like to tinker
A step-by-step runthrough of the processing steps, software and hardware involved in training and using an AI model, …
Jonathan Fischer is a hardware, RF, and IoT security enthusiast that spent a decade in operational technology before …
Matthew Richard is a software developer that enjoys coding in low level languages. His favorite text editor is Neovim. …
As advances in endpoint protection, AI/machine learning, and attack detection continue to bolster defenses, …
Michele Bousquet is a digital forensics analyst, a professor of cybersecurity at Tulane University, and the host of the …
This talk starts out with a low-math refresher on how blockchain transactions and Bitcoin mining work, complete with …
Phil Brass started in the security industry in 1998 at for Internet Security Systems, and has been a member of the …
As a consumer of technical security testing services, how can you get the best security testing? If you’re …
Evan is a passionate Information Security professional with over 10 years of IT and Cybersecurity experience, including …
Landing a job requires experience. But how do you get Kobe beef experience without a job or shift gears in your …
Joshua Crumbaugh is one of the world’s leading security awareness experts and a world-renowned cyber security …
What if you could harness the same psychological tactics hackers use‚ only this time, for good? In this session, ethical …
With more than 25 years of information security experience, Chris Silvers, CISSP, MBA, is the Founder and Principal …
Take a journey with us down a dark road, into a back access alley and the after-hours loading dock of an unsuspecting …
EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …
This talk will cover an overview of effective hash cracking methodologies with theory and demo for hashes such as NTLM, …
Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …
Damon “ch3f” Small will discuss a real-world, complex attack-chain scenario. This will demonstrate how …
Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …
We drink and tell cool stories about us doing stuff
Raymond Evans is a security researcher having 9+ years of experience in cyber security. He has been working with …
Physical penetration is critical to security assessments, providing invaluable insights into an organization’s …
Join us for a great performance by DualCore, and others. And, an Open Bar, of course!!
Where? Lafitte Room of the Hotel
Mansoor Ahmad is an offensive security professional who has always had a curiosity about how things worked. While in …
In this engaging talk, we explore how a press photographer’s unique perspective enhances our understanding of red …
Allyn Stott is a senior staff engineer at Airbnb where he works on the InfoSec Technology Leadership team. He spends …
Your efforts are futile. Long hours, high stress, constant conflict, and burnout-for what? So your cloud team can expose …
Matthew Wollenweber (@MWollenweber) is a security engineer at Axonius. He has over 20 years experience as a …
As America marches ever closer to fascism, people are scared. Activism can offer cathartic relief and affect real …
Devan Fendlason is a graduate student at Delgado Community College, where she studied Cybersecurity and has earned the …
How do you hack into cybersecurity? I had a job that only led to death, Hospice Assistant, I needed a change. There was …
Closing Remarks and Awards for 2025