Hacker Happy Hour 6:00pm - 8:00pm
Break 12:15am - 12:25pm
Break
Resume Rewriting 10:45am - 6:00pm
Reducing “Mixtape to Master Key”... 11:45am - 12:15pm
Assessing the Embedded Devices O... 12:25pm - 12:55pm
Weathering the Storm: The Art of... 1:30pm - 2:00pm
BeyondCorp: Beyond “fortress” se... 2:10pm - 2:40pm
Live Dissection: Anatomy of a Br... 2:50pm - 3:20pm
Advanced Internet dataset combin... 3:30pm - 4:00pm
How to Build a Security Team and... 4:10pm - 4:40pm
Should I Pay or Should I Go? Gam... 4:50pm - 5:20pm
Hacker Jeopardy 6:00pm - 8:00pm
Registration 8:30am - 5:00pm
Illusion vs Reality: An FBI Agent’s take on how private sector r... 10:30am - 11:30am
Spymaster Challenge 10:45am - 6:00pm
Capture The Flag 10:45am - 6:00pm
Lockpick Village 10:45am - 6:00pm
DNS attacks, a history and overv... 11:45am - 12:15pm
Building an Effective Intrusion... 12:25pm - 12:55pm
Exploiting Broken Webapps 1:30pm - 4:30pm
Make Alerts Great Again 1:30pm - 2:00pm
Security through Visibility: Org... 2:10pm - 2:40pm
Better SSH management with ephem... 2:50pm - 3:20pm
The Cyber Insurance Emperor Has... 3:30pm - 4:00pm
Linux Monitoring at Scale with e... 4:10pm - 4:40pm
Tired of Playing Exploit Kit Wha... 4:50pm - 5:20pm
Ask the EFF 5:20pm - 5:50pm
Queercon Mixer 5:30pm - 8:00pm
Sunday Night Party 12 8:00pm - 13 1:00am
Breakfast 8:30am - 9:30am
Lunch 12:00pm - 1:30pm
Resume Rewriting 10:45am - 5:20pm
How Secure are your Docker Image... 10:45am - 11:15am
Five Keys to Building an Applica... 11:30am - 12:00pm
When Bandit(s) Strike - Defend y... 1:30pm - 2:00pm
Securing Kubernetes 2:10pm - 2:40pm
Hijacking .NET to Defend PowerSh... 2:50pm - 3:20pm
Access Control with Concierge: O... 3:30pm - 4:00pm
Does DoD Level Security Work in... 4:10pm - 4:40pm
Dormant DOMination 4:50pm - 5:20pm
Registration 8:30am - 1:00pm
Swimming Upstream: Regulation vs Security 9:30am - 10:30am
Spymaster Challenge 10:45am - 5:20pm
Capture The Flag 10:45am - 4:00pm
Lockpick Village 10:45am - 5:20pm
Witchcraft Compiler Collection :... 10:45am - 11:15am
Fighting Email Phishing with a C... 11:30am - 12:00pm
#securityselfie (size up your ap... 1:30pm - 2:00pm
Exploiting Websites Hands-On 1:30pm - 3:30pm
Opinionless Enforcement of Opini... 2:10pm - 2:40pm
AtomBombing: Injecting Code Usin... 2:50pm - 3:20pm
Bypassing malware analysis sandb... 3:30pm - 4:00pm
Look Ma, No Hands! - Decentraliz... 4:10pm - 4:40pm
The Underground Economy of Apple... 4:50pm - 5:20pm
Happy Hour 5:20pm - 6:30pm