FRIDAY

CONFERENCE KICKOFF ᛫ AUGUST 24 2018

KEYNOTE SPEAKER: ANNE MARIE ZETTLEMOYER

 

TALKS: tO BE ANNOUNCED

 

 

 

 

 


 

SATURDAY

CONFERENCE DAY 2 ᛫ AUGUST 25 2018

KEYNOTE SPEAKER: TO BE ANNOUNCED

 

TALKS: TO BE ANNOUNCED

 

 

 


TALK TRACKS

1) OFFENSIVE TRACK

The red side of Security. Talks, discussions, demonstrations on breaking, bypassing, or otherwise hacking security controls and systems.

2) DEFENSIVE TRACK

The blue side of Security. Talks, discussions, demonstrations on preventing, detecting or deterring hacking and other security incidents.

3) EDUCATION TRACK

There is a huge discrepancy in the number of open cyber security positions and the available candidates to fill these positions, and it looks like it's only getting worse.
We want to inspire the next generation of hackers. Encourage individuals to pursue education in Cyber Security and obtain a rewarding career in the field. Individual talks geared towards K-12 students, Higher Education and Workforce Development.


events

CAPTURE THE FLAG

A hacking challenge for every skill level. This CTF is open to all attendees, there is no qualifier or pre-registration required. Just show up with a laptop and have fun. Teams of any size are encouraged.
We guarantee this is a CTF like you've never seen before!
Prizes for the top five teams will be announced.

HARDWARE HACKING VILLAGE

Over the years, hackers have been creating custom hardware for the purposes of hacking. Using Kickstarter, the inventors were able to create wireless tools such as the famous Software defined radio HackRF, and RFID badge cloners such as the 125khz RFIDler, and the 13.56 MHz  Chameleon-Mini.
Then there’s hardware designed to hack hardware, such as the Chip Whisperer-Lite which does side-channel attacks, and debuggers such as Goodfet, and BlackMagic Probe. We’ve got all of these and more. We’ve also have a BusPirate, Chikra, FTDI-Friend, logic analyzers, voltage meters,  an oscilloscope, soldering irons, cables, jumpers and other goodies. Here’s your chance to learn about existing hardware, bring in your own hardware, and your questions. Try your hand at hardware hacking. 
Remember, if you can’t open it, you don’t own it.

PING PONG TOURNAMENT

The name pretty much says it all! Depending on the number of entrants this will be a double elimination tournament with prizes for the top four finishers. Games will be spread out during the conference. We'll schedule flexible game times for all entrants to participate and have fun!

AnneMarieZ.jpg

ANNE MARIE ZETTLEMOYER

is a security thought leader with a business background, analytics expertise, and 19 years of experience across 8 industries. She is a highly skilled cyber strategist with expertise in cybersecurity risk and operations, decision science, metrics, and performance measurement. Her work experience includes senior management positions at large financial institutions such as Freddie Mac and Capital One, cybersecurity companies like FireEye, and service at the United States Secret Service. She holds an MBA degree from the University of Michigan and she has CISSP (Certified Information Systems Security Professional) and CEH (Certified Ethical Hacker) certifications.