layout |
---|
default |
{:.text-white}
{: .mb-3 .pb-5}
{: .text-white .table .table-sm .table-striped }
| Time Slot | Track 1 | Speaker | Track 2 | Speaker |
| 08:45 - 09:00 | Opening Remarks | BSidesROC Staff | Opening Remarks | BSidesROC Staff |
| 09:00 - 09:50 | Keynote | Marcelle Lee | Keynote | Marcelle Lee |
| 10:00 - 10:50 | Tales From the Crypt...Analyst: The After Life | Jeff Man | Unleash the Hash Master | Qasim Ijaz |
| 11:00 - 11:50 | Exploit and Malicious Tool Development Utilizing Open Source Software | Olivia Gallucci | Zero Trust Unleashed: Halt the Hack with Microsoft Conditional Access | Dan Megalo |
| 12:00 - 01:30 | Lunch | | Lunch | |
| 01:30 - 01:55 | DMARC-y Mark and Phishy Bunch | Gary Freas | Is Physical Security Also Cybersecurity? | Michael Weiskopff |
| 02:00 - 02:50 | Microsoft at your BEC and (API) Call: Auditing Mailbox Item Access for Incident Response | Richard Smith | PostScript Pirates: A tale of Memory Corruption | Justin Taft |
| 03:00 - 03:50 | Active Directory ain’t going anywhere, so we might as well secure it | Eric Woodruff | Styrofoam in a Landfill: CVSS Never Changes | Jack Hatwick |
| 04:00 - 04:50 | Lies, Telephony, and Hacking History | Matt Scheurer | Paths to a Job in Security | Chris Maulding |
| 05:00 - 05:30 | Closing Remarks | BSidesROC Staff | Closing Remarks | BSidesROC Staff |