Agenda

Click on the session title
to view the abstract

All Dates 
9/18-9/21 

Badge Pick-Up

Community Room

Welcome Reception

Camelback Overlook

Passing the Torch

Camelback Overlook

Breakfast

Paradise Terrace

Welcome from SentinelLabs

Paradise Ballroom

The Ransomware Trust Paradox

Paradise Ballroom

A 30-Year Journey from Compilation Student to Decompilation Pioneer

Paradise Ballroom

Resilience and Protection in the Windows Ecosystem

Paradise Ballroom

Morning Break Sponsored by The Vertex Project

Paradise Ballroom Foyer

A Walking Red Flag (With Yellow Stars)

Paradise Ballroom

Daggers and Arrows

OTR
Paradise Ballroom

Breaching the Battlefield: UNC4221’s Espionage for Military Advantage

OTR
Paradise Ballroom

Farmyard Gossip: The Foreign Footprint in U.S. Agriculture

Paradise Ballroom

Lunch

Paradise Terrace

The Consolation of Threat Intelligence

Paradise Ballroom

PKFAIL: Supply-Chain Failures in Secure Boot Key Management

Paradise Ballroom

Unearthing the Archaic: 25 Years of SSL VPNs and Their Lifecycle Vulnerability Footprints

Paradise Ballroom

Unveiling Hidden Infrastructure: Tracking Threats via SSH Public Keys

OTR
Paradise Ballroom

Afternoon Break Sponsored by Alperovitch Institute

Paradise Ballroom Foyer

The Real AI Race - Disinformation In The Taiwanese Election

Paradise Ballroom

That Story We Can't Tell

OTR
Paradise Ballroom

Follow the Money: Uncovering the CCP's Incorporation and Ownership of Chinese Firms Investing in the US

Paradise Ballroom

Closing Remarks

Paradise Ballroom

Dinner

Mountain Shadows Lawn

After Party Sponsored by Dreadnode

Dreadnode Suite

Breakfast

Paradise Terrace

WORKSHOP: Beating Sophistication With Simplicity: Advanced Techniques for Detecting New Malicious Infrastructure

Echo Room

You Shall Not Pass: Dancing with Expressions

Mountain View Room

Let Them Eat Cake: “Secure by Upgrade” Software is a National Security Threat

Valley Room

Kryptina RaaS: From Unsellable Cast-off to Enterprise Ransomware

Mountain View Room

Frequently Attacked Questions

Valley Room

Ebury: Public-private partnership unveils the full scale of a sophisticated Linux threat

Mountain View Room

Raptor Train: China’s Multi-Year Mirai Facelift

Valley Room

Coffee Break

Paradise Ballroom Foyer

WORKSHOP: Visualizing memory allocations with WinDbg and p5.js

 
Echo Room

R1Z: From Broker to Busted

OTR
Mountain View Room

Following Frankenstein (and Friends): Hamas Cyber Operations In and Out Conflict

OTR
Valley Room

Honeypots, HMIs, and Havoc? Investigating the Real Threat Landscape of Internet-Exposed Control Systems

 
Mountain View Room

Jumping hurdles to verify vulnerabilities on Chinese Instant Messaging

OTR
Valley Room

Come Play, Supreme Leader! DPRK Remote Workers and the Culture of Evony Online

Mountain View Room

Knowledge IIS power

Valley Room

Lunch

Paradise Terrace

WORKSHOP: The AI-talian Job: Hands-on attacks on AI Systems

Echo Room

Down the BadHatch: Analysis of a Financially Motivated Access Broker

Mountain View Room

DigitalRecyclers: Yet another member of the APT15 galaxy

Valley Room

No Such Talk

OTR
Mountain View Room

UNC1860 & The Temple of Oats - Iran's hidden hand in Middle Eastern Networks

 
Valley Room

Tracking the Cyber Space Ghost from Oast to Oast

Mountain View Room

Avalanche: Unmasking UNC5537's Campaign Targeting Snowflake Customer Instances

Valley Room

Happy Hour Sponsored by Silent Push

Community Room

3rd Annual Cyber Crime Gala - Cocktail Reception

Paradise Ballroom Foyer

3rd Annual Cyber Crime Gala - Dinner & Awards

Paradise Ballroom

After Party Sponsored by Dreadnode

Dreadnode Suite

Standard Departure Day

 

Add-On Research & Recovery Day