| 1 |
| Sponsor Load-in | 7:30 AM - |
Registration Desk |
| 2 |
Gates Open
| Gates Open | 8:00 AM - |
Registration Desk |
| 3 |
Opening Ceremony
| Opening Ceremony | 8:45 AM - 9:00 AM |
Room 215-217 |
| 4 |
CTF Registration Opens
| CTF Registration Opens | 9:00 AM - |
Room 210 |
| 5 |
The Perfect Storm: Navigating AI-Powered Threats, Nation-State Attacks, & Supply Chain Vulnerabilites in 2025
| Matthew Hickey | 9:00 AM - 9:50 AM |
Room 215-217 |
| 6 |
CTF Starts
| CTF Starts | 10:00 AM - |
Room 210 |
| 7 |
Cloud Security & Other Assorted Cautionary Tales
| Matt Scheurer | 10:00 AM - 10:50 AM |
Room 215-217 |
| 8 |
Defenders Hate It! Compromise Vulnerable SaaS Applications with this One Weird Trick
| Eric Woodruff | 11:00 AM - 11:50 AM |
Room 215-217 |
| 9 |
Lunch
| Lunch | 12:00 PM - 12:59 PM |
|
| 10 |
Beyond the Hollywood Hack: The Reality of Red Teaming
| Lee Ayers | 1:00 PM - 1:50 PM |
Room 215-217 |
| 11 |
We Don't Like That Part, So We Turned it Off
| William Fielder | 2:00 PM - 2:50 PM |
Room 215-217 |
| 12 |
New Frontier or New Security Risk: Navigating the Security Implications of Large Language Models
| Daniel Efaw | 3:00 PM - 3:50 PM |
Room 215-217 |
| 13 |
SEO Vulnerabilites: Expanding & Fortifying Digital Footprints in Business
| Chris Young | 4:00 PM - 4:50 PM |
Room 215-217 |