
Keynote Speakers

Matthew Hickey

Josh Brunty
Talk Schedule
Schedule is subject to change and maybe without notice.
Talk Schedule
Schedule is subject to change and maybe without notice.
Track One
Sponsor Load-in |
Time Schedule7:30 AM - | RoomRegistration Desk |
Gates OpenGates Open |
Time Schedule8:00 AM - | RoomRegistration Desk |
Opening CeremonyOpening Ceremony |
Time Schedule8:45 AM - 9:00 AM | RoomRoom 215-217 |
![]() CTF Registration OpensCTF Registration Opens |
Time Schedule9:00 AM - | Room |
![]() Matthew HickeyThe Perfect Storm: Navigating AI-Powered Threats, Nation-State Attacks, & Supply Chain Vulnerabilites in 2025 |
Time Schedule9:00 AM - 9:50 AM | RoomRoom 215-217 |
![]() CTF StartsCTF Starts |
Time Schedule10:00 AM - | Room |
![]() Matt ScheurerCloud Security & Other Assorted Cautionary Tales |
Time Schedule10:00 AM - 10:50 AM | RoomRoom 215-217 |
![]() Eric WoodruffDefenders Hate It! Compromise Vulnerable SaaS Applications with this One Weird Trick |
Time Schedule11:00 AM - 11:50 AM | RoomRoom 215-217 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM | Room |
![]() Lee AyersBeyond the Hollywood Hack: The Reality of Red Teaming |
Time Schedule1:00 PM - 1:50 PM | RoomRoom 215-217 |
![]() William FielderWe Don't Like That Part, So We Turned it Off |
Time Schedule2:00 PM - 2:50 PM | RoomRoom 215-217 |
![]() Daniel EfawNew Frontier or New Security Risk: Navigating the Security Implications of Large Language Models |
Time Schedule3:00 PM - 3:50 PM | RoomRoom 215-217 |
![]() Chris YoungSEO Vulnerabilites: Expanding & Fortifying Digital Footprints in Business |
Time Schedule4:00 PM - 4:50 PM | RoomRoom 215-217 |
Opening Ceremony |
Time Schedule8:45 AM - 9:00 AM | RoomRoom 215-217 |
![]() Dr. Josh BruntyKeynote Presentation |
Time Schedule9:00 AM - 9:50 AM | RoomRoom 215-217 |
![]() Luke CanfieldThe Drone Renaissance: DIY Aerial Recon for Red Teams...or Real Threats |
Time Schedule10:00 AM - 10:50 AM | RoomRoom 215-217 |
![]() Adam BeattyCybersecurity & Leadership: The Opportunity & Growth vs The Problem & Vulnerability |
Time Schedule11:00 AM - 11:50 AM | RoomRoom 215-217 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM | Room |
![]() Chris AthaAI Gets Turnt |
Time Schedule1:00 PM - 1:50 PM | RoomRoom 215-217 |
![]() Micah BrownBootstrapping a Basic GRC Tool for Your Organization |
Time Schedule2:00 PM - 2:50 PM | RoomRoom 215-217 |
![]() CTF EndsCTF Ends |
Time Schedule3:00 PM - | Room |
![]() Eric SchultzLessons in Cyber Insecurity |
Time Schedule3:00 PM - 3:50 PM | RoomRoom 215-217 |
![]() Joshua MarpetContinuous Compliance & Multicellular Security |
Time Schedule4:00 PM - 4:50 PM | RoomRoom 215-217 |
Track Two
![]() D. Cody CutrightEnhancing Cyber Defense Readiness with Satellite Digital Twins |
Time Schedule10:00 AM - 10:50 AM |
RoomRoom 213-214 |
![]() Nathan RicePhishwalker: How HAckers Evade Detection Like the Cryptids of Cyberspace |
Time Schedule11:00 AM - 11:50 AM |
RoomRoom 213-214 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
![]() Branden MillerWhat Keeps me up at Night? ... Lack of Security Controls! |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 213-214 |
![]() Lillian WarnerIs your Printer Haunted and your Laptop Possessed? |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 213-214 |
![]() Steven TruaxThe Recon Mixtape: Greatest Hits from Project Discovery |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 213-214 |
![]() Jeff PitchfordBuilding the Future IT Workforce Through Career Technical Education |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 213-214 |
![]() Adam ComptonAn Old Hillbillys Guide to BASH for Pentests: Automating, Logging, and Covering your Butt |
Time Schedule10:00 AM - 10:50 AM |
RoomRoom 213-214 |
![]() Jim JonesPower Up Your Career Through Community and Public Learning |
Time Schedule11:00 AM - 11:50 AM |
RoomRoom 213-214 |
LunchLunch |
Time Schedule12:00 PM - 12:59 PM |
Room |
![]() Bill GardnerSuperpowers in Action: How Neurodivergent Minds Excel in Cybersecurity |
Time Schedule1:00 PM - 1:50 PM |
RoomRoom 213-214 |
![]() Eric Kron & James McQuigganFrom Prompts to Purpose: Navigating Cybersecuirty in the Age of Agentic AI |
Time Schedule2:00 PM - 2:50 PM |
RoomRoom 213-214 |
![]() Jeremy AzevedoHow to Hack an Election |
Time Schedule3:00 PM - 3:50 PM |
RoomRoom 213-214 |
![]() Chris GriffinWhy Do Security Professionals Keep Doing Things They See Don't Work |
Time Schedule4:00 PM - 4:50 PM |
RoomRoom 213-214 |