Skip to content

2025 Schedule

Thursday

 

Time/TrackFrequency DriftPhase ShiftSignal NoiseMayhem
8:30 AMWelcome to GrrCON
– hosted by EggDropX & P1nkN1ghtmare
9:00 AMMystery Company: The case of the ghost on the wire
– Rachel Giacobozzi
10:00 AMThe Imposter’s Guide to Hacking… Without Technical Talent!
– Jayson Street
The Death of Passwords – Why We’re Still Stuck in the Past
– Shaun Bertrand
You Trained It on Trash and Gave It Root Access
– Andrew Orr
Executive Summit
– Invite Only
11:00 AMStanding on Business: My First CVE and Unexpected Vendor Drama
– Seth Kraft
OopsSec: The Day I Made the DMV Even Slower
– Andrew Crotty (Gingerhacker)
The role of Data and AI Governance in 2025 Data Strategy
– Holly Anderson
11:30 AMREDACTED
– Matt Hoy “mattrix” and John Stauffacher “Geeksp33d”
The SOC of the Future: More Threats, Less Problems
– Richard Marsh
Local LLMs in Action for CTI Automation
– Kai Iyer
12:30 PMFuck Your Integration: A Practical Guide to Breaking WebMethods
– Ryan Bonner
How to HACK your career in 3 simple steps
– Chris Burrows
Cracking The Code: Understanding & Defending Against the OWASP Top 10
– Micah Silverman
1:00 PMModern Fileless RAT Tactics: Node.js Abuse : Technical Analysis and Threat Attribution
– Reegun Richard Jayapaul
AI, AI, Oh^2!!!
– Grant Asplund
It comes from the depths
– Kyle Eaton
1:30 PMHack the Hackers: Outsmarting Cyber Criminals with Deception Technology
– Yiannis Vassiliades
2:30 PMOperation Monkey Business: An Exploration of Video Game Hacking
– Michael Jackson & Hunter Lumsdon
Surviving the Vulnerability Abyss: A CISO’s Perspective on Costly Vendor Solutions, Politics, Prioritization, and the limits of Pentesting
– Jason Bevis
Detections & Dragons ; Creating Detection Logic that Scales
– Mak Foss & Rachel Schwalk
3:30 PMBuilding a Local LLM-Based Vulnerability Scanner
– Dmitry Moiseev
It Wasn t a Surprise. Just a Scheduled Disaster
– Oyin Ajayi
LOLBins Under the Microscope: A Data-Driven Exploration of Abused System Binaries
– Roy Correa
4:00 PM30ish years of @#$&ing w/ management & other dirty mind tricks
– Brian Herr
Stomping on Buildings: Stop acting like Godzilla and start acting like Godzilla
– Kevin Johnson
Prompt to Payload: Weaponizing LLMs for Full-Spectrum Offense
– Aamir “Dr Chaos” Lakhani
4:30 PMSecurity Burnout, Budgets, and BS: What InfoSec Teams Wish Vendors Knew
– Rachel Arnold
5:00 PMBlood in the Water – Patients on the Table
– Michael Aguilar (v3ga)
Meshtastic Attacktastic
– Dave Schwartzberg
The Empire Strikes Out: Cybersecurity Lessons from Star Wars
– Walt Powell
6:00 PMPerformance: Palmer Trolls
– Ben Palmer

 

Friday

 

Time/TrackFrequency DriftPhase ShiftSignal NoiseMayhem
9:00 AMHackers Don’t Hack, They Log In
– Dr. Louis DeWeaver III
10:00 AMThe Importance of Being in Third Place
– Robert Wagner
How’s the Weather in Your Neck of the Woods? A Close Look at the Global Email Threat Landscape
– Jared Peck
Automating the boring part: Penetration Testing VMs deployment as Code
– Jacob Harrand
OSINT CTF Panel
– Chris Silvers
11:00 AMVibe or Die – Rapid Prototyping Cyber Solutions with AI
– Chas Clawson
Mole Wars: Defending the Rebel Alliance from Data Theft
– Cole Padula
Managing Open Source Network Security Tools Using Configuration Management
– Ellie Rennard
DFIU Set Up
Closed
11:30 AMUnveiling the Basics of API Security
– Jason Brown
The future of Security Operations: Autonomous, Agentic, and Agile
– Chris Kudulis

Where Art Thou, O Auth? Trust Tragedies in Single Page Apps
– Carley Fant

NoonRising From The Ashes
– Robert Cioffi
Building Trust Through AI Governance
– Steven F. Fox
Context Is All You Need: LLM-Powered, Proactive API Security
– Thomas Young, Cloye Hairgrove, &amp Sebastian Baba
1:00What if Compliance Does Equal Security?
– Jeff Man
An Old Hillbilly’s Guide to BASH for Pentests: Automating, Logging, and Covering Your Butt
– Adam Compton
Firewalls and Fire Alarms: What to Do When Your Best Defenses Go Up in Smoke
– Catherine J. Ullman
DFIU!
– Presented by Lintile and the DFIU Crew
2:00 PMSocial Engineering with AI
– Brett Gustafson
Keeping Our History Alive: The Hacker’s Guide to Sticker Preservation
– Brian Baskin
Just Context: Interpretable ML for Root Cause and Attack Flow Discovery
– Ezz Tahoun
3:00 PMI Believe in Harvey Dent
– John DeRyke
Evolution of Cyber Security and the Ransomware Gap
– Abu Yera
Crack, Track, React: Dual-Stacking Offense and Defense with Hash Intelligence
– Evan Hosinski
3:30 PMBuilding a Local LLM-Based Vulnerability Scanner
– Dmitry Moiseev

On the Care and Feeding of CyberNinjas – 2025
– Atlas of Doom

4:00 PMAround The World In 34,000 minutes
– Chris Roberts
What an NFL Lockeroom Can Teach Us about Cybersecurity Teams
– Sean Tufts
The Art of Inventive Hacking
– Sean Verity and Dave Blandford
5:00 PMF’k Phish Testing: 30 Years of Failures
– J Wolfgang Goerlich
6:00 PMDay 2 Wrap Up
– hosted by EggDropX & P1nkN1ghtmare