Adventures in the Underland: Uncommon Hacker’s Persistence Methods and Countermeasures Gallery Adventures in the Underland: Uncommon Hacker’s Persistence Methods and Countermeasures 2025 Talks - 25 Minutes Presented by Paula Januszkiewicz
Lies, Lures, and LLMs; Augmenting Cyber Deception with AI Gallery Lies, Lures, and LLMs; Augmenting Cyber Deception with AI 2025 Talks - 25 Minutes Presented by Dylan Shroll
The False Sense of Security: Defense Becoming a Vulnerability Gallery The False Sense of Security: Defense Becoming a Vulnerability 2025 Talks - 25 Minutes Presented by Nathan Eades
Agents of Change: Practical Adoption Framework for Agentic AI in Security Operations Gallery Agents of Change: Practical Adoption Framework for Agentic AI in Security Operations 2025 Talks - 25 Minutes Presented by Ryan Rowclifffe
Advancing from Individual Contributor to Cybersecurity Leader Gallery Advancing from Individual Contributor to Cybersecurity Leader 2025 Talks - 25 Minutes Presented by Kevin Bong
DFIR-as-Code: Scaling Incident Response Beyond Human Limits Gallery DFIR-as-Code: Scaling Incident Response Beyond Human Limits 2025 Talks - 25 Minutes Presented by Justin Borland
Leading Multi-Generational Cybersecurity Teams with Transparency, Candor, and Empathy Gallery Leading Multi-Generational Cybersecurity Teams with Transparency, Candor, and Empathy 2025 Talks - 50 Minutes Presented by Mike Glatz
My Cyber Sense Is Tingling! Detection Engineering With Free Tools Gallery My Cyber Sense Is Tingling! Detection Engineering With Free Tools 2025 Talks - 50 Minutes Presented by Matthew Gracie
Threat hunting in the browser Gallery Threat hunting in the browser 2025 Talks - 50 Minutes Presented by Luke Jennings
UNFAIR after all; Critical considerations for risk management frameworks Gallery UNFAIR after all; Critical considerations for risk management frameworks 2025 Talks - 50 Minutes Presented by Jack Burgess