Conference Registration 3:00pm - 8:00pm
Welcome Party 6:00pm - 8:00pm
S1/E3: Do you C2? If you do, ICU. 4:00pm - 4:50pm
Offensive GoLang 5:00pm - 5:50pm
New Speaker Workshops - 30 minutes each 10:00am - 4:45pm
Conference Registration 7:30am - 6:00pm
Resume Review and/or Mock Interview w/ Jake Williams 10:00am - 4:00pm
Welcome to WWHF
Keynote 9:00am - 9:50am
Automating Social Engineering for the Anti-socia... 12:00pm - 12:45pm
Story time with Johnny Long 6:00pm - 6:50pm
What's hiding on your networks 10:00am - 10:50am
Breaking Into Your Building - A Hacker's Guide to Una... 11:00am - 11:50am
We’ve Got A Lot To Learn: Building threat models to s... 1:00pm - 1:50pm
Finding a Domain’s Worth of Malware 2:00pm - 2:50pm
Selfies of the Mind: Confessions of an Extreme Diaris... 3:00pm - 3:50pm
Incident Response is HARRRRRD… but it doesn’t have to... 4:00pm - 4:50pm
The Security of DevSecOps 5:00pm - 5:50pm
Hacking a Security Career 10:00am - 10:50am
Social Forensication: A Multidisciplinary Approach to... 11:00am - 11:50am
Hack (Apart) Your Career - How to Fund Doing What You... 1:00pm - 1:50pm
Digging Deeper into the Google Calendar Attack Surfac... 2:00pm - 2:50pm
Adversarial Emulation 3:00pm - 3:50pm
Architecting Secure ICS Environments 4:00pm - 4:50pm
Burpsuite Team Server - Collaborative Web Pwnage 5:00pm - 5:50pm
Campfire Stories - 15 minutes each 9:00am - 2:00pm
After Party 8:00pm - 10:00pm
Conference Registration 9:00am - 6:00pm
Resume Review and/or Mock Interview w/ Jake Williams 11:00am - 3:00pm
Baselining Behavior Tradecraft through Simulations 4:00pm - 4:50pm
Chuckwagon Dinner & Awards 5:00pm - 6:30pm
Kerberos & Attacks 101 9:00am - 9:50am
Elevating your Windows privileges like a boss! 10:00am - 10:50am
Consent, Alignment, and Cooperation in the Internet E... 11:00am - 11:50am
Active Defense Web Edition: Web apps dripping with ho... 1:00pm - 1:50pm
Post Exploitation: Striking Gold with Covert Recon 2:00pm - 2:50pm
The Nerdlist: The Totally Not 1337 Bad Idea's That Gi... 3:00pm - 3:50pm
Be Evil | A Toolset for Tier 1 Threat Emulation 9:00am - 9:50am
Py2k20 - Transitioning from Python2 to Python3 10:00am - 10:50am
"First-try" DNS Cache Poisoning on IPv4 and IPv6 11:00am - 11:50am
Assumed Breach: A Better Model For Penetration Testin... 2:00pm - 2:50pm
The Hackers Apprentice 3:00pm - 3:50pm