| 1 |  | Sponsor Load-in | 7:30 AM - | Registration Desk | 
                                                | 2 | Gates Open | Gates Open | 8:00 AM - | Registration Desk | 
                                                | 3 | Opening Ceremony | Opening Ceremony | 8:45 AM - 9:00 AM | Room 215-217 | 
                                                | 4 | CTF Registration Opens | CTF Registration Opens | 9:00 AM - | Room 210 | 
                                                | 5 | The Perfect Storm: Navigating AI-Powered Threats, Nation-State Attacks, & Supply Chain Vulnerabilites in 2025 | Matthew Hickey | 9:00 AM - 9:50 AM | Room 215-217 | 
                                                | 6 | CTF Starts | CTF Starts | 10:00 AM - | Room 210 | 
                                                | 7 | Cloud Security & Other Assorted Cautionary Tales | Matt Scheurer | 10:00 AM - 10:50 AM | Room 215-217 | 
                                                | 8 | Defenders Hate It! Compromise Vulnerable SaaS Applications with this One Weird Trick | Eric Woodruff | 11:00 AM - 11:50 AM | Room 215-217 | 
                                                | 9 | Lunch | Lunch | 12:00 PM - 12:59 PM |  | 
                                                | 10 | Beyond the Hollywood Hack: The Reality of Red Teaming | Lee Ayers | 1:00 PM - 1:50 PM | Room 215-217 | 
                                                | 11 | We Don't Like That Part, So We Turned it Off | William Fielder | 2:00 PM - 2:50 PM | Room 215-217 | 
                                                | 12 | New Frontier or New Security Risk: Navigating the Security Implications of Large Language Models | Daniel Efaw | 3:00 PM - 3:50 PM | Room 215-217 | 
                                                | 13 | SEO Vulnerabilites: Expanding & Fortifying Digital Footprints in Business | Chris Young | 4:00 PM - 4:50 PM | Room 215-217 |