Draft Highly Tentative
Ops track
30-Jan Presentation Session
Time Topic Speaker
8:30 registration
9:15 Welcome Gadi
9:30 AM All Your Cloud Are Belong To Us - Hunting Compromise in Azure Nate Warfield
10:00 AM Exploiting Misery: How scammers try to profit from corporate breaches, natural disasters and terrorist attacks Daniel Schwalbe
10:30 AM break
10:50 AM SOC1 Using Cloud Enabled Feedback Loops Joseph Zadeh
11:30 AM Lunch forage off site
1:00 PM Phoenix - The evolution of Cuckoo malware analysis Justin Borland and Greg Olmstead
1:40 PM The Starting Problem Laura Sheble with Rick Wesson
2:10 PM Phish in a Barrel: Hunting and Analyzing Phishing Kits at Scale Jordan Wright
2:30 PM break
3:00 PM ItÕs a Beautiful Day in the Neighborhood Matt Maisel
3:40 PM Get the right security tools into your Enterprise Sam Harwin
4:15 PM Survey Pete Lindstrom and Eric Jardine
4:45 PM Turbo Pitches
5:15 PM Dismiss
31-Jan Presentation Session
Time Topic Speaker
9:00 AM Turbo Pitches & Selection voting
9:30 AM Detecting DNS Tunnelling Brad Antoniewicz
10:00 AM Profiling and Detecting all Things SSL with JA3 John Althouse
10:30 AM break
10:50 AM Hardened yet usable: Reduce the effectiveness of common attacks while preserving user experience on a typical workstation Guillaume Ross
11:30 AM Lunch forage off site
1:00 PM 50 Shades of Graylog Eric Capuano
1:45 PM Down the Open Source Software Rabbit Hole Kymberlee Price
2:30 PM break
3:00 PM Evolution of Assessing OneÕs Security Posture Against Offensive Operations Frank Duff and Chris Korban
3:45 PM Night of the living vulnerabilities: forever-days of IoT Stefano Zanero and Roberto Clapis
4:15 PM Survey results and followup Pete Lindstrom and Eric Jardine
4:45 PM Dismiss
Feb 1 2018 Presentation Session
Time Topic Speaker
9:00 AM Leveraging Fuzzing for Defensive Gains Ian Bridges
10:00 AM One-click Browser Defense Brandon Dixon
10:30 AM break
10:50 AM Mind the Gap, Bro: Using Network Monitoring to Overcome Lack of Host Visibility Joe Slowik
11:30 AM Lunch forage off site
1:00 PM That was Close! Doing Science with Near Misses Adam Shostack
2:00 PM break
2:30 PM Preparing for a Destructive Malware Attack John Scimone
3:30 PM Turbo Talks
5:00 PM Dismiss
Philosophy Track
30-Jan Presentation Session
Time Topic Speaker
8:30 registration
9:00 AM Opening remarks Gadi
9:10 AM Home Field Advantage Josh DeFrain
9:30 AM Increasing Retention Capacity: Research from the Field Andrea Little Limbago
9:50 AM Red Teaming isn't just about attacking Toby Kohlenberg
10:30 AM Break
10:50 AM Cura te ipsum: Professionalizing defenders and incident response Thomas Millar
11:30 AM Lunch forage off site
12:50 PM Strengthen Your SecOps Team by Leveraging Neurodiversity Megan Roddie
1:10 PM Beyond Warm & Fuzzy: Cyber-risk Ethics Decision Support Erin Kenneally
1:50 PM Moving Beyond the Pepsi Challenge: Evaluation and Assessment of Security Tool Effectiveness Joe Slowik
2:10 PM A Dangerous Folly: Why Attack Prediction CanÕt Be Our Goal Kelly Shortridge
2:50 PM Break
3:10 PM The Contrarian CISO Jerry Perullo
3:50 PM Cyber Portfolio: Using the Cyber Defense Matrix for better spending and communications Guillaume Keith Ross
4:10 PM The Never-Ending Game of Attribution Janusz Urbanowicz
4:40 PM Universal Persistent Bugs Paul Vixie
5:20 PM Dismiss
31-Jan Working Session
9:00 AM ACoD 2017 Working Group Reports
11:00 AM Discussion 2017 WG
11:30 lunch
1:00 PM ACoD 2018 Working Group Formation
5:00 PM Dismiss
Feb 1 2018 Working Sessions
9:00 AM ACoD 2018 Working Group Reports
11:00 Working Group Discussions
Lunch
1:00 PM Working Group Discussions
5:00 PM Dismiss
2-Feb
9:00 AM ACoD 2018 WG reports
11:00 AM TBA
12:00 PM Dismiss
Party
Jan 30 sponsored by private individual
Time: 5:30 PM - 7:30 PM
Location: Announced at conference
Contact me if you want to sponsor a party
Notes: Please note we do not have sponsors for on-site lunches. Plan to forage for lunch.
Acknowledgements and Appreciation to: To JASK ( www.jask.ai) for on-site water and snacks!!
To duo for assisting in organizing the conference
To the generous unnamed sponsor who paid for the venue
To another generous unnamed sponsor who paid for venue infrastructure
To the unnamed sponsor for providing power strips and an wireless access point
To the generous individual sponsoring the party.
To Sounil, Mike and Reversinglabs for lunch
To Intel for breakfast.