Draft |
|
Highly Tentative |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ops track |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30-Jan |
|
Presentation Session |
|
|
|
|
|
|
|
Time |
|
Topic |
|
Speaker |
|
|
|
|
|
8:30 |
|
registration |
|
|
|
|
|
|
|
9:15 |
|
Welcome |
|
Gadi |
|
|
|
|
|
9:30 AM |
|
All Your Cloud Are Belong To Us - Hunting Compromise
in Azure |
|
Nate Warfield |
|
|
|
|
|
10:00 AM |
|
Exploiting Misery: How scammers try to profit from
corporate breaches, natural disasters and terrorist attacks |
|
Daniel Schwalbe |
|
|
|
|
|
10:30 AM |
|
break |
|
|
|
|
|
|
|
10:50 AM |
|
SOC1 Using Cloud Enabled Feedback Loops |
|
Joseph Zadeh |
|
|
|
|
|
11:30 AM |
|
Lunch |
|
forage off site |
|
|
|
|
|
1:00 PM |
|
Phoenix - The evolution of Cuckoo malware analysis |
|
Justin Borland and Greg Olmstead |
|
|
|
|
|
1:40 PM |
|
The Starting Problem |
|
Laura Sheble with Rick Wesson |
|
|
|
|
|
2:10 PM |
|
Phish in a Barrel: Hunting and Analyzing Phishing
Kits at Scale |
|
Jordan Wright |
|
|
|
|
|
2:30 PM |
|
break |
|
|
|
|
|
|
|
3:00 PM |
|
ItÕs a Beautiful Day in the Neighborhood |
|
Matt Maisel |
|
|
|
|
|
3:40 PM |
|
Get the right security tools into your Enterprise |
|
Sam Harwin |
|
|
|
|
|
4:15 PM |
|
Survey |
|
Pete Lindstrom and Eric Jardine |
|
|
|
|
|
4:45 PM |
|
Turbo Pitches |
|
|
|
|
|
|
|
5:15 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
31-Jan |
|
Presentation Session |
|
|
|
|
|
|
|
Time |
|
Topic |
|
Speaker |
|
|
|
|
|
9:00 AM |
|
Turbo Pitches & Selection voting |
|
|
|
|
|
|
|
9:30 AM |
|
Detecting DNS Tunnelling |
|
Brad Antoniewicz |
|
|
|
|
|
10:00 AM |
|
Profiling and Detecting all Things SSL with JA3 |
|
John Althouse |
|
|
|
|
|
10:30 AM |
|
break |
|
|
|
|
|
|
|
10:50 AM |
|
Hardened yet usable: Reduce the effectiveness of
common attacks while preserving user experience on a typical workstation |
|
Guillaume Ross |
|
|
|
|
|
11:30 AM |
|
Lunch |
|
forage off site |
|
|
|
|
|
1:00 PM |
|
50 Shades of Graylog |
|
Eric Capuano |
|
|
|
|
|
1:45 PM |
|
Down the Open Source Software Rabbit Hole |
|
Kymberlee Price |
|
|
|
|
|
2:30 PM |
|
break |
|
|
|
|
|
|
|
3:00 PM |
|
Evolution of Assessing OneÕs Security Posture
Against Offensive Operations |
|
Frank Duff and Chris Korban |
|
|
|
|
|
3:45 PM |
|
Night of the living vulnerabilities: forever-days of
IoT |
|
Stefano Zanero and Roberto Clapis |
|
|
|
|
|
4:15 PM |
|
Survey results and followup |
|
Pete Lindstrom and Eric Jardine |
|
|
|
|
|
4:45 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feb 1 2018 |
|
Presentation Session |
|
|
|
|
|
|
|
Time |
|
Topic |
|
Speaker |
|
|
|
|
|
9:00 AM |
|
Leveraging Fuzzing for Defensive Gains |
|
Ian Bridges |
|
|
|
|
|
10:00 AM |
|
One-click Browser Defense |
|
Brandon Dixon |
|
|
|
|
|
10:30 AM |
|
break |
|
|
|
|
|
|
|
10:50 AM |
|
Mind the Gap, Bro: Using Network Monitoring to
Overcome Lack of Host Visibility |
|
Joe Slowik |
|
|
|
|
|
11:30 AM |
|
Lunch |
|
forage off site |
|
|
|
|
|
1:00 PM |
|
That was Close! Doing Science with Near Misses |
|
Adam Shostack |
|
|
|
|
|
2:00 PM |
|
break |
|
|
|
|
|
|
|
2:30 PM |
|
Preparing for a Destructive Malware Attack |
|
John Scimone |
|
|
|
|
|
3:30 PM |
|
Turbo Talks |
|
|
|
|
|
|
|
5:00 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Philosophy Track |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30-Jan |
|
Presentation Session |
|
|
|
|
|
|
|
Time |
|
Topic |
|
Speaker |
|
|
|
|
|
8:30 |
|
registration |
|
|
|
|
|
|
|
9:00 AM |
|
Opening remarks |
|
Gadi |
|
|
|
|
|
9:10 AM |
|
Home Field Advantage |
|
Josh DeFrain |
|
|
|
|
|
9:30 AM |
|
Increasing Retention Capacity: Research from the
Field |
|
Andrea Little Limbago |
|
|
|
|
|
9:50 AM |
|
Red Teaming isn't just about attacking |
|
Toby Kohlenberg |
|
|
|
|
|
10:30 AM |
|
Break |
|
|
|
|
|
|
|
10:50 AM |
|
Cura te ipsum: Professionalizing defenders and
incident response |
|
Thomas Millar |
|
|
|
|
|
11:30 AM |
|
Lunch |
|
forage off site |
|
|
|
|
|
12:50 PM |
|
Strengthen Your SecOps Team by Leveraging
Neurodiversity |
|
Megan Roddie |
|
|
|
|
|
1:10 PM |
|
Beyond Warm & Fuzzy: Cyber-risk Ethics Decision
Support |
|
Erin Kenneally |
|
|
|
|
|
1:50 PM |
|
Moving Beyond the Pepsi Challenge: Evaluation and
Assessment of Security Tool Effectiveness |
|
Joe Slowik |
|
|
|
|
|
2:10 PM |
|
A Dangerous Folly: Why Attack Prediction CanÕt Be
Our Goal |
|
Kelly Shortridge |
|
|
|
|
|
2:50 PM |
|
Break |
|
|
|
|
|
|
|
3:10 PM |
|
The Contrarian CISO |
|
Jerry Perullo |
|
|
|
|
|
3:50 PM |
|
Cyber Portfolio: Using the Cyber Defense Matrix for
better spending and communications |
|
Guillaume Keith Ross |
|
|
|
|
|
4:10 PM |
|
The Never-Ending Game of Attribution |
|
Janusz Urbanowicz |
|
|
|
|
|
4:40 PM |
|
Universal Persistent Bugs |
|
Paul Vixie |
|
|
|
|
|
5:20 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
31-Jan |
|
Working Session |
|
|
|
|
|
|
|
9:00 AM |
|
ACoD 2017 Working Group Reports |
|
|
|
|
|
|
|
11:00 AM |
|
Discussion 2017 WG |
|
|
|
|
|
|
|
11:30 |
|
lunch |
|
|
|
|
|
|
|
1:00 PM |
|
ACoD 2018 Working Group Formation |
|
|
|
|
|
|
|
5:00 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feb 1 2018 |
|
Working Sessions |
|
|
|
|
|
|
|
9:00 AM |
|
ACoD 2018 Working Group Reports |
|
|
|
|
|
|
|
11:00 |
|
Working Group Discussions |
|
|
|
|
|
|
|
|
|
Lunch |
|
|
|
|
|
|
|
1:00 PM |
|
Working Group Discussions |
|
|
|
|
|
|
|
5:00 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2-Feb |
|
|
|
|
|
|
|
|
|
9:00 AM |
|
ACoD 2018 WG reports |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11:00 AM |
|
TBA |
|
|
|
|
|
|
|
12:00 PM |
|
Dismiss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Party |
|
|
|
|
|
|
|
|
|
|
|
Jan 30 sponsored by private individual |
|
|
|
|
|
|
|
|
|
Time: 5:30 PM - 7:30 PM |
|
|
|
|
|
|
|
|
|
Location: Announced at conference |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contact me if you want to sponsor a party |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Notes: |
|
Please note we do not have sponsors for on-site
lunches. Plan to forage for lunch. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Acknowledgements and Appreciation to: |
|
To JASK ( www.jask.ai) for on-site water and snacks!! |
|
|
|
|
|
|
|
|
|
To duo for assisting in organizing the conference |
|
|
|
|
|
|
|
|
|
To the generous unnamed sponsor who paid for the
venue |
|
|
|
|
|
|
|
|
|
To another generous unnamed sponsor who paid for
venue infrastructure |
|
|
|
|
|
|
|
|
|
To the unnamed sponsor for providing power strips
and an wireless access point |
|
|
|
|
|
|
|
|
|
To the generous individual sponsoring the party. |
|
|
|
|
|
|
|
|
|
To Sounil, Mike and Reversinglabs for lunch |
|
|
|
|
|
|
|
|
|
To Intel for breakfast. |
|
|
|
|
|
|
|