Thursday - May 14

Sync with the Nolacon ical feed!
TimeSpeaker(s)Title
15:0015:00 Registration - Reg Desk Floor 2 - 3-5pm - Canceled, Badges are arriving Thurs, so holding reg until Friday.

Friday - May 15

TimeSpeaker(s)Title
09:0009:00 Registration Opens - Reg Desk Floor 2
10:15

Krewe of NolaCon

images/image.jpeg
10:15 NolaCon 2026 Intro and Opening Remarks
10:30

Mansoor Ahmad

images/ma.jpeg

Mansoor Ahmad is an offensive security professional who has always had a curiosity about how things worked. While in …

10:30 Who Takes the Bait: Understanding phishing susceptibility with practitioner intelligence

Every organization has phishing training, but almost none can answer the question “which roles are actually the …

11:00

Anthony Hendricks

images/image.png

Anthony Hendricks is a legal problem solver and litigator at Crowe & Dunlevy. At Crowe & Dunlevy, Anthony serves …

11:00 2026 is the New 2016: Relearning the Cyber Lessons from 2016

In 2016, several high-profile data breaches took place, including two Yahoo breaches that affected 1.5 billion user …

12:0012:00 Lunch

A 1 hour lunch break, enjoy the food of New Orleans.

13:00

C.H. Becker

anonymous

C.H. Becker, aka Malate, began as an infosec and hacker hobbyist in the days of dial-up BBSes. This began a lifelong …

13:00 Hacking into the Blue Team and Leadership

The hacker mindset, and the curiosity and skills developed as one driven by such, are most commonly seen as contributing …

14:00

w0mbat

anonymous

Kelsey (w0mbat) is a threat detection and response analyst focused on investigating activity that appears legitimate but …

14:00 It Wasn’t Spoofed: When Authentication Lies

A suspicious email spread internally. The user whose account was associated with the message stated they did not send …

15:00

Sno0ose

images/image.png

Brad Ammerman, a leading figure in security testing, currently serves as the Senior Director at Prescient Security. His …

15:00 FORTRESS (Framework for Organized RedTeam and Threat Response Evaluation for Security and Safeguards)

Physical security is a critical component of an organization’s overall cybersecurity strategy. Despite its importance, …

16:00

Bryson Byrd

images/image.png

Bryson Byrd is just a guy–a guy trying to be proud of the one staring back in the mirror through the work he does within …


Joshua Childs

anonymous

Joshua Childs is an associate professor of educational leadership and policy at The University of Texas at Austin. His …

16:00 Culture Eats Strategy for Breakfast (And Your Security Program for Lunch)

We keep buying tools. We keep writing policies. We keep getting breached. The uncomfortable truth is that …

17:0017:00 Happy Hour with Open Bar

2 Hour open bar for all attendees!!!

Want the bar next to your booth, This sponsorship spot is still open!!! …

Saturday - May 16

TimeSpeaker(s)Title
09:0009:00 Registration Opens - Reg Desk Floor 2
10:00

Kevin Tackett (fka Johnson)

images/image.jpeg

Kevin Johnson is a leading cybersecurity expert with over 30 years of experience who has become one of the …

10:00 Keynote - Back to the Future-Proof: Preparing Now for Quantum Decryption Threats

Quantum computing is no longer a distant theoretical concern. Adversaries are already executing harvest now, decrypt …

11:00

James Gilkey (Retro)

images/image.png

James Gilkey is an Information Security professional with over a decade in the IT industry, providing services from …

11:00 Pentester's Tools of the Trade

Pentesting doesn’t have to be mysterious. At its core, it’s about understanding systems and knowing which tools are …

12:0012:00 Lunch

A 1 hour lunch break, enjoy the food of New Orleans.

13:00

Matthew Wollenweber

images/IMG_4466.jpeg

Matthew Wollenweber is a security engineer at a late-stage cybersecurity startup. He has over 20 years experience as a …

13:00 Project Mayhem: Defending New Orleans from a Private Spy Network

There are more than 5,000 private spy cameras in New Orleans, operated by a former NOPD officer with zero oversight or …

14:00

Emanuel "Manny" Ohlsen

images/image.png

Emanuel “Manny” Ohlsen is a Principal Consultant specializing in governance architecture, quantified risk modeling, and …

14:00 The Death of the Annual Risk Assessment: Engineering Continuous Governance in the AI Era

For decades, enterprise risk programs have operated on an annual cadence: conduct a risk assessment, update the …

15:00

Evan Kirstein

images/image.png

Evan is a massive nerd, father of 2 boys, and an InfoSec professional in the Finance sector with over 10 years of …


Luke Canfield

images/image.png

Luke Canfield is a cybersecurity analyst focused on vulnerability management, RMF compliance, and OSINT, with over eight …

15:00 The Drone Renaissance 2: #DronesForGood

This session is a maker-friendly blueprint for rapid, community-scale “out-of-band” comms when conventional networks …

16:00

Jae Park

images/image.png

Jae is a Senior Cyber Threat Intelligence analyst with over a decade of experience in the cybersecurity space. He has …

16:00 From Hurricanes to BLIZZARDs: A Perspective on the role of Cyber Threat Intelligence.

Cyber Threat Intelligence (CTI) is often misunderstood by leadership and misapplied by operations. This talk argues that …

16:30

Zach Miller

images/image.png

Zach Miller is a CISSP and security engineer at Bluestaq where the job is keeping large, fast-moving technology stacks …

16:30 LOLMgmt: SCCM to Intune - How the Management Plane Became the Attack Surface Nobody’s Watching

Configuration Manager (SCCM and MECM) manages millions of enterprise endpoints and operates on a core assumption: the …

20:0020:00 NolaCon 2026 Party!

Join us for a great performance by DualCore, and others. And, an Open Bar, of course!!

Where? Conference area of the …

Sunday - May 17

TimeSpeaker(s)Title
10:00

Sanjay Kodukula

images/image.jpg

Sanjay Kodukula is a Senior Cyber Security Engineer at Visa Inc on the M&A Product Security Architecture team. He …


Sandeep Siva

images/image.jpeg

I am Sandeep S., a Sr. Security engineer at VISA, where my work focuses on the intersection of cloud security, …

10:00 Securing the AI Supply Chain Before Your Vendors Become Your Weakest Link

Every organization now relies on vendors, and every vendor is racing to bolt AI capabilities onto their platforms. While …

10:30

Luke McOmie

images/image.jpeg

Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …


Ryan Jones

images/image.jpeg
10:30 Panel

We drink and tell cool stories about us doing stuff

12:00

Krewe of NolaCon

images/image.jpeg
12:00 NolaCon 2026 Closing Remarks and Awards

Closing Remarks and Awards for 2026

Register Today!