DerbyCon 9 Finish Line Final Selections
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

View only
 
ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
TIMETrack 1 upstairs marriott I II III IVTrack 2 upstairs marriott VII VIII IX XTrack 3 downstairs kentucky ETIMEStable Talks downstairs B, C, & D
2
8:30 - 8:55Opening Ceremony - DerbyCon Team
3
9:00 - 9:50Opening Keynote - Presented by Ed Skoudis12:00 - 12:25Bypassing MacOS Detections With Swift - Cedric Owens
4
10:00 - 10:50Derbycon Story Time Panel - Presented by Dustin Heywood (Evil Mog) and others12:30 -12:55IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough - Jason Lewis
5
11:00 - 11:50Lunch - on your own1:00 -1:25Quiet time :)
6
12:00 - 12:50Dynamic Risk Taking and Social Engineering - Chris HadnagyMetasploit Town Hall Finale - Brent Cook, Aaron Soto, Jeffrey Martin, Matthew KienowWell, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices. - John Strand1:30 - 1:55SCADA: What the next Stuxnet will look like and how to prevent it - Joseph Bingham
7
1:00 - 1:50Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits - Dr. Jared DeMott, John StigerwaltI PWN thee, I PWN thee not! - Jayson E StreetBloodHound From Red to Blue - Mathieu Saulnier2:00 - 2:25Designing & building a stealth C2 LDAP channel - Rindert Kramer
8
2:00 - 2:50“How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question - Matt GraeberScientific computing for information security – forging the missing link - Ryan ElkinsAzure Sentinel - A first look at Microsoft's SIEM Solution - Carl Hertz2:30 - 2:55There's No Place like (DUAL)Homed. - David E Young Jr
9
3:00 - 3:50To CORS! The cause of, and solution to, your SPA problems! - Tim (lanmaster53) Tomes, Kevin CodyDefeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs - Nick Lehman (Graph-X), Steve Eisen (Rum Twinkies)Behavioral Security and Offensive Psychology at Scale - Samantha Davison, Josh Schwartz 3:00 - 3:25Modlishka - Is a Mantis Eating 2FA's Lunch? - Lance Peterman
10
4:00 - 4:50Not A Security Boundary: Breaking Forest Trusts - Will Schroeder, Lee ChristensenThe Hackers Apprentice - Mark BaggettPowerShell Security: Looking Back from the Inside - Lee Holmes3:30 - 3:55Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape - Gabrielle Hempel
11
5:00 - 5:50Enabling The Future (Panel) - Dave Kennedy, Jess Walpole, Scott Angelo, Kevin BakerHow to Tell the C-Level Their Baby is Ugly - Heather SmithCyber false flags and adversarial counterintelligence, oh my… - Jacob Williams4:00 - 4:25It Must Be Fancy Bear! - Xena Olsen
12
6:00 - 6:50Concert setupHacker Jeopardy Setup4:30 - 4:55Getting the most out of your covert physical security assessment - A Client’s Guide - Brent White, Tim Roberts
13
7:00 - 7:505:00 - 5:25Getting dirty on the CANBUS - Justin Herman
14
5:30 - 5:55Automated Dylib Hijacking - Jimi Sebree
15
6:00 - 6:25Phishing past Mail Protection Controls using Azure Information Protection (AIP) - Oddvar Moe, Hans Lakhan
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...