| Time/Track | Frequency Drift | Phase Shift | Signal Noise | Mayhem |
|---|
| 8:30 AM | Welcome to GrrCON – hosted by EggDropX & P1nkN1ghtmare |
| 9:00 AM | Mystery Company: The case of the ghost on the wire – Rachel Giacobozzi |
| 10:00 AM | The Imposter’s Guide to Hacking… Without Technical Talent! – Jayson Street | The Death of Passwords – Why We’re Still Stuck in the Past – Shaun Bertrand | You Trained It on Trash and Gave It Root Access – Andrew Orr | Executive Summit – Invite Only |
| 11:00 AM | Standing on Business: My First CVE and Unexpected Vendor Drama – Seth Kraft | OopsSec: The Day I Made the DMV Even Slower – Andrew Crotty (Gingerhacker) | The role of Data and AI Governance in 2025 Data Strategy – Holly Anderson |
| 11:30 AM | REDACTED – Matt Hoy “mattrix” and John Stauffacher “Geeksp33d” | The SOC of the Future: More Threats, Less Problems – Richard Marsh | Local LLMs in Action for CTI Automation – Kai Iyer |
| 12:30 PM | Fuck Your Integration: A Practical Guide to Breaking WebMethods – Ryan Bonner | How to HACK your career in 3 simple steps – Chris Burrows | Cracking The Code: Understanding & Defending Against the OWASP Top 10 – Micah Silverman |
| 1:00 PM | Modern Fileless RAT Tactics: Node.js Abuse : Technical Analysis and Threat Attribution – Reegun Richard Jayapaul | AI, AI, Oh^2!!! – Grant Asplund | It comes from the depths – Kyle Eaton |
| 1:30 PM | Hack the Hackers: Outsmarting Cyber Criminals with Deception Technology – Yiannis Vassiliades |
| 2:30 PM | Operation Monkey Business: An Exploration of Video Game Hacking – Michael Jackson & Hunter Lumsdon | Surviving the Vulnerability Abyss: A CISO’s Perspective on Costly Vendor Solutions, Politics, Prioritization, and the limits of Pentesting – Jason Bevis | Detections & Dragons ; Creating Detection Logic that Scales – Mak Foss & Rachel Schwalk |
| 3:30 PM | Building a Local LLM-Based Vulnerability Scanner – Dmitry Moiseev | It Wasn t a Surprise. Just a Scheduled Disaster – Oyin Ajayi | LOLBins Under the Microscope: A Data-Driven Exploration of Abused System Binaries – Roy Correa |
| 4:00 PM | 30ish years of @#$&ing w/ management & other dirty mind tricks – Brian Herr | Stomping on Buildings: Stop acting like Godzilla and start acting like Godzilla – Kevin Johnson | Prompt to Payload: Weaponizing LLMs for Full-Spectrum Offense – Aamir “Dr Chaos” Lakhani |
| 4:30 PM | Security Burnout, Budgets, and BS: What InfoSec Teams Wish Vendors Knew – Rachel Arnold |
| 5:00 PM | Blood in the Water – Patients on the Table – Michael Aguilar (v3ga) | Meshtastic Attacktastic – Dave Schwartzberg | The Empire Strikes Out: Cybersecurity Lessons from Star Wars – Walt Powell |
| 6:00 PM | Performance: Palmer Trolls – Ben Palmer |