Presented by Huxley Barbee
How to Deal With Human Malware in the Workplace
Presented by Gary Rimar
From 1-on-1s to 1s and 0s
Presented by Sochima Okoye
Can’t Trust These Logs
Presented by Jose A. Martinez
Building Yourself Into a Strong Identity Practitioner
Presented by Eric Woodruff
Breaking into Information Security, but {d!f3r3nt}
Presented by Veran Patel
Authentication Proxy Attacks: Detection, Response and Hunting
Presented by Chris Merkel and Chester Le Bron