Back To Schedule
Thursday, October 24 • 10:00am - 4:45pm
New Speaker Workshops - 30 minutes each

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
10:00am - Nick Roy: OSINT and the Hermit Kingdom. Leveraging online sources to learn more about the worlds most secret nation.

10:45am - Marcus W Tonsmann: DoH (DNS over HTTPS) for attackers and defenders
DoH is coming. This talk will prepare you by covering the basics of the protocol, available tools for testers, and techniques being leveraged by real adversaries. Proactive defensive measures will also be discussed, with an eye towards the future.

11:30am - Robert Hawes: Enumerating Userland Applications Attack Surface on Windows
This presentation will cover how to perform attack surface enumeration concerning windows userland applications. Inside the domain of vulnerability research, many different methodologies exist for how a researcher may start their journey with auditing an application. This presentation will provide information on how to enumerate the attack surface of userland applications that are deployed on the Windows operating system.

1:00pm - Kelly Whitaker: Hacking Pioneers, Breaking through the stigma of influential advertising
This presentation will challenge the way you think about those who are in the computer science industry.

1:45pm - Ryan Stalets: Abusing AWS Architecture (and How to Defend It)
Amazon Web Services (AWS) offers many architecture features which improve application performance and make it easier to deploy applications. This talk will look at two AWS architecture features which can be abused to hide C2 traffic and compromise application code and infrastructure. We will also discuss these features from a "prevent, detect, respond" perspective with a special emphasis on detection and response actions for SOC/IR teams.

2:30pm - Serenity Smile: Fortify Yourself First: Personal Cybersecurity Distilled
As a cybersecurity professional, are you doing the best you can to protect
yourself and your family first? This talk will thoroughly distill the latest research and provide a
practical cheat sheet for what you need to do NOW to mitigate risks as a user of cyberspace.

3:15pm - Nicholas Childs: Aircraft avionics primer for hackers

4:00pm - James Arnold: Configuring Malleable C2 for Threat Emulation and Opsec Safe(ish) Payloads
This talk will start by showing the options of Cobalt Strike’s Malleable C2 Profiles. Next, we will go through the process of getting information from malware analysis reports to mimic malware for use in testing detection systems and/or use in Purple Team projects. Finally, we will go through options for creating a more Opsec safe(ish) profile.

avatar for Nick Roy

Nick Roy

Nick Roy is currently a Senior Security Specialist at Splunk focusing on security automation and improving blue team response. Before Splunk, Nick was at Phantom Cyber working with partners across the globe build out their security automation practices and delivering them to their... Read More →
avatar for Marcus Tonsmann

Marcus Tonsmann

Marcus works as a Detection Engineer at a national healthcare company. In his role, he spends a lot of time researching offensive techniques and how to detect and prevent them. Currently, he holds GPEN, GDAT and GNFA certifications. When not in front of a computer, Marcus loves to... Read More →
avatar for Robert Hawes

Robert Hawes

VerSprite Security
Robert Hawes is a Security Researcher at VerSprite Security. He enjoys all things in the area of vulnerability research and exploit development. Robert is passionate about discovering zero-day vulnerabilities and developing accompanying exploits for advance capabilities. Robert is... Read More →
avatar for Kelly Whitaker

Kelly Whitaker

Kelly Whitaker is the Information Technology Officer for the National Weather Service Rapid City forecasting office where she is a Jill of all trades - coding, security, setting up VMs, configuring servers, putting out fires, and making forecasters happy. She’s worked on many national... Read More →
avatar for Ryan Stalets

Ryan Stalets

Ryan is an analyst on the security incident response team of a Fortune 100 global company. His focus areas include cloud threat detection/response and network intrusion detection. Ryan has a decade of experience in IT, with nearly five years as a CSIRT analyst, and holds several GIAC... Read More →

Serenity Smile

Serenity Smile is an Information Security Analyst for a Fortune 100 company and grateful to be a SANS Diversity Cybertalent Immersion Academy Graduate.  She holds the GIAC GSEC (GIAC Security Essentials), GIAC GCIH (GIAC Certified Incident Handler), and GIAC GCIA (GIAC Certified... Read More →
avatar for Nicholas Childs

Nicholas Childs

I am a FCC Licensed Aircraft Avionics systems Technician.  The primary focus in my career has been the repair and service of Radar, Targeting, Sensor, Communication, and Navigation Systems, on multiple Civilian and Military platforms.  I am DoD Information Assurance level 2 certified... Read More →
avatar for James Arnold

James Arnold

James is a Senior Offensive Security Engineer for Jack Henry & Associates.  He currently performs penetration tests and Red Team projects.https://github.com/xx0hcdhttps://www.linkedin.com/in/jparnold02/... Read More →

Thursday October 24, 2019 10:00am - 4:45pm MDT