Time/Track |
Track 1 |
Track M |
Track Peppermint |
8:30 AM |
Welcome to GrrCON – hosted by EggDropX & P1nkN1ghtmare |
9:00 AM |
Keynote – Guardians of Reality: Countering Hype in InfoSec – Kevin Johnson |
10:00 AM |
Being B.A.D. for good reasons! & How we can help others to be better! – Jayson E. Street |
AI and Cyber Ops: Optimization, Augmentation, and Assimilation – Shane Harsch |
Unmasking AWS Deceptions: Unraveling Cloud Security’s Sneaky Side – Yossi Tamarov |
11:00 AM |
Latest Developments in the Ransomware Threat Landscape – Jithin Nair & Danny Connelly |
How I learned to Stop Worrying & Love Structured File Formats – Kyle Eaton |
Can you get High on Hacking – Erick Boulter |
11:30 AM |
His palms are sweaty, C2s up, implants ready… – Jonathan Fischer |
All Aboard! Application Security Posture Management is Taking Off! – John “JT” Tierney |
How to Start a Riot: Transform your security and observability program to meet today’s challenges – Kam Amir |
Noon |
Advanced Persistent Teenagers: Learning from LAPSUS$, 0ktapus, and other groups – Matt Muller |
Strengthening Cybersecurity Incident Response: Collaborative Efforts and Customer Impact – JD Shotwell |
Context Matters: Why Vetted Component Lists Are Mostly Security Theater – Cortez Frazier Jr. |
12:30 PM |
Fun Ways to Run Code in .NET – Nicholas Spagnola |
Breaking into Cybersecurity the Easy Way – Brian Dudek |
Seeing is Believing Knowing: Anatomy of APT Exploit and Why Visibility must Evolve to Awareness – Chris Pittman |
1:00 PM |
Keynote – New Isn’t Always Novel: Grep’ing Your Way to $20K at Pwn2Own, and How You Can Too – Zach Hanley and James Horseman |
2:00 PM |
How to choose a tinfoil hat (with science!) – Gabe Schuyler |
Working remote overseas and all that goes wrong – Scott Thomas |
The Anatomy of a Threat Hunting Hypothesis – Lauren Proehl |
2:30 PM |
Deterring Cybercrime via a Global Cybergrid – Charles Herring |
Break it to make it: Uplift developer security maturity and smash the cycle of recurrent vulnerabilities – Steve Allor |
DFIR Analysis with a Purpose – Terryn Valikodath |
3:30 PM |
Social Engineering from the Detective Perspective – Tom Howard |
Finding authentication and authorization security bugs in web application routes – Matt Schwager |
Cloud Native is causing a Culture Shift within Organizations – Tim Connolly |
4:00 PM |
The Great Task Heist: Stealing the Spotlight on Scheduled Tasks – Brandon DeVault |
Overcoming the CyberSecurity Poverty Line – Robert Wagner |
Tales of AV/EDR Bypass: Ropping the Night Away – Gregory Hatcher & John Stigerwalt |
5:00 PM |
Friction – J Wolfgang Goerlich |
Oil, Circuits, and Cheese: An Additive Model of Failure – Jennifer Shannon |
Security Flaw Safari: Reading between the lines and hunting security risks – Brian Halbach |
6:00 PM |
Day 1 Wrap Up – hosted by EggDropX |