Time/Track | Track 1 | Track M | Track Peppermint |
---|
8:30 AM | Welcome to GrrCON – hosted by EggDropX & P1nkN1ghtmare |
9:00 AM | Keynote – Guardians of Reality: Countering Hype in InfoSec – Kevin Johnson |
10:00 AM | Being B.A.D. for good reasons! & How we can help others to be better! – Jayson E. Street | AI and Cyber Ops: Optimization, Augmentation, and Assimilation – Shane Harsch | Unmasking AWS Deceptions: Unraveling Cloud Security’s Sneaky Side – Yossi Tamarov |
11:00 AM | Latest Developments in the Ransomware Threat Landscape – Jithin Nair & Danny Connelly | How I learned to Stop Worrying & Love Structured File Formats – Kyle Eaton | Can you get High on Hacking – Erick Boulter |
11:30 AM | His palms are sweaty, C2s up, implants ready… – Jonathan Fischer | All Aboard! Application Security Posture Management is Taking Off! – John “JT” Tierney | How to Start a Riot: Transform your security and observability program to meet today’s challenges – Kam Amir |
Noon | Advanced Persistent Teenagers: Learning from LAPSUS$, 0ktapus, and other groups – Matt Muller | Strengthening Cybersecurity Incident Response: Collaborative Efforts and Customer Impact – JD Shotwell | Context Matters: Why Vetted Component Lists Are Mostly Security Theater – Cortez Frazier Jr. |
12:30 PM | Fun Ways to Run Code in .NET – Nicholas Spagnola | Breaking into Cybersecurity the Easy Way – Brian Dudek | Seeing is Believing Knowing: Anatomy of APT Exploit and Why Visibility must Evolve to Awareness – Chris Pittman |
1:00 PM | Keynote – New Isn’t Always Novel: Grep’ing Your Way to $20K at Pwn2Own, and How You Can Too – Zach Hanley and James Horseman |
2:00 PM | How to choose a tinfoil hat (with science!) – Gabe Schuyler | Working remote overseas and all that goes wrong – Scott Thomas | The Anatomy of a Threat Hunting Hypothesis – Lauren Proehl |
2:30 PM | Deterring Cybercrime via a Global Cybergrid – Charles Herring | Break it to make it: Uplift developer security maturity and smash the cycle of recurrent vulnerabilities – Steve Allor | DFIR Analysis with a Purpose – Terryn Valikodath |
3:30 PM | Social Engineering from the Detective Perspective – Tom Howard | Finding authentication and authorization security bugs in web application routes – Matt Schwager | Cloud Native is causing a Culture Shift within Organizations – Tim Connolly |
4:00 PM | The Great Task Heist: Stealing the Spotlight on Scheduled Tasks – Brandon DeVault | Overcoming the CyberSecurity Poverty Line – Robert Wagner | Tales of AV/EDR Bypass: Ropping the Night Away – Gregory Hatcher & John Stigerwalt |
5:00 PM | Friction – J Wolfgang Goerlich | Oil, Circuits, and Cheese: An Additive Model of Failure – Jennifer Shannon | Security Flaw Safari: Reading between the lines and hunting security risks – Brian Halbach |
6:00 PM | Day 1 Wrap Up – hosted by EggDropX |