Skip to content

2024 Schedule

Thursday

 

Time/TrackXer0 TrackFukuda TrackCampos TrackJ Track
8:30 AMWelcome to GrrCON
– hosted by EggDropX & P1nkN1ghtmare
9:00 AMAdversaries Rising: Looking Ahead in Security
– Dave Kennedy
10:00 AMRansomware as a Business
– Ken Westin
The contextual approach to IoT cybersecurity
– Jason Masker & Yaniv Maimon
Breaking Down Binaries: Navigating the Labyrinth of IoT Firmware Analysis
– Edwin Shuttleworth
Executive Summit
– Invite Only
11:00 AMMonsters Under Your Bed – Mapping the Dark Web with Python
– Zack Smith
Hack the Hash: Unveiling Password Cracking Strategies
– Evan Hosinski
The essential role of AI in effective data governance
– Ben Corll
11:30 AMWe Don’t Like That Part, so we Turned it Off
– William Fielder
AI-Charged Quizzes: The Game-Changing Secret to Supercharging Your Training
– Jason Bevis
Tales From the Crypt…Analyst: The After Life
– Jeff Man
12:30 PMHacking Trucks through RP1210 Shimming Attacks
– Jaime Lightfoot
Demystifying NTLMv1 & MSCHAPv2
– Dustin Heywood (EvilMog)
Assess, Adapt, Secure
– Aaron Rose
1:00 PMCVE-2023-52709: Phone as Key DOS in Cars & Supply Chain Risk
– Kevin Mitchell
The Data Risks of Jumping on the RAG Wagon
– Justin Hutchens & Eric Johnson
Mouse in the house, operationalizing purple teaming
– Trevor Olson
1:30 PMKeeping the genie in the bottle. Lessons learned from classic Sci-Fi.
– Brian Herr
2:30 PMForging in Fire: Application Injection Payloads and Norse Mythology
– Kevin Johnson
MSRC Vulnerability Update
– Dr Jared Demott
Saving Lives Around the Table: Firefighters’ Insights on Tabletops
– John Hollenberger
3:30 PMThe Azure Necronomicon: Unraveling Identity’s Cosmic Horror
– Brandon DeVault
Tips and Tricks To Creating Your First Conference Talk
– Whitney Phillips
There will be <8100D> : “Attack Surface of Oil Rigs and ICS
– Weston Hecker
4:00 PMAnd we’re back
– mattrix x g33kspeed
PROMPT INJECTIONS V1T4L V3RN4CUL4R V3RB0S3LY V3X1NG
– Kyle Meyer
EHLO World: Spear-Phishing at Scale using Generative AI
– Josh Kamdjou
4:30 PMAnatomy of a cloud attack: Insights from Real-Life Experiences
– Iman Randhawa
5:00 PMTaking the Human Element to the MAX
– Alyssa Miller
The Curious Case of: Maria
– Jayson Brown
Identity Threat Hunting Insights: Unveiling Real-World Cases
– Sharon Nachshony
6:00 PMDay 1 Wrap Up
– hosted by EggDropX

 

Friday

 

Time/TrackXer0 TrackFukuda TrackCampos TrackJ Track
9:00 AMGenerative AI: A Threat, Hope or just Hype
– Dr. Louis F. DeWeaver III
10:00 AMWho stole the cookies? Evolution of access vectors
– Rachel Giacobozzi
A Security Peace of Mind
– Shane Harsch
Applying Machine Learning to Enhance Malware Analysis, Classification, & Detection
– Solomon Sonya
Birthing Perjury-free AI
– Charles Herring
11:00 AMOld Bugs on New Roads: How Legacy Attacks Threaten CarPlay
– Dmitry Moiseev
The new SaaS cyber kill chain
– Luke Jennings
Penetration Test != CTF
– Patrick Matthews
The Great Cybersecurity Resignation¦ are you ready for it?
– Ashley Townsend
11:30 AMWhat’s in a Name – Hiding in Plain Sight
– Brian Olson
Leveraging AI to Enhance a Cyber Security Analyst Investigation Workflow
– Lisa Jones-Huff

Pretty Dope Format (not really)
– Kyle Eaton

NoonAutomobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool
– Atlas of D00m
A Weekend Dive into Open Source Intelligence
– Gabe Schuyler
Who’s gonna to carry the boats
– Chris Burrows
1:00Ragnarök: when threat modelling goes wrong
– Finux
How to find an IOC across thousands of servers in seconds
– Joshua Stenhouse
Where’s the Money: Defeating ATM Disk Encryption
– Matt Burch
DFIU!
– Presented by Lintile and the DFIU Crew
2:00 PMWhy you don’t belong in this community or the Label of Hacker in under 30 minutes!
– Jayson E. Street
Living Off The Land: How Threat Actors Avoid Detection
– Anthony Kraudelt
The Curious Case of Alice and Bob
– Catherine Ullman
3:00 PMAll Access: A press photographer’s perspective on Red Teaming scenario
– Mansoor Ahmad
Bridge the gap between Requirements and Budget with a Security Telemetry Pipeline
– Bill Emmet
Zero to GRC Hero
– Micah K Brown
3:30 PMCute cats and copy cats – the ancient issue with clipboards
– Eric LaVoie

Protecting the Executive Digital Footprint – Beyond the Usual
– Chris Bullock

4:00 PMTopic determined by the number of Feds in the room
– Chris Roberts
Replacement CISOs in the Post-AGI Era
– Roman Eng
Hacking Shame: A New Psychology for Advancing Infosec
– George Kamide
OSINT CTF Panel
– Presented by Chris Silvers
5:00 PMSurviving the Robot Apocalypse 2: Dawn of the Rise of LLMs
– J Wolfgang Goerlich
6:00 PMDay 2 Wrap Up
– hosted by EggDropX & P1nkN1ghtmare