Schedule & Speakers

9:00 am

Doors Open

card_membership

Registration Open

9:00-3:30 / Room TBD

9:30 am

mic

Opening Ceremony

9:30-10:00 / Room TBD

10:00 am

lock_open

Lockpick Village Open

10:00-4:00 / Room TBD

Test your hand at picking various difficulties of locks.

computer

Cyber Range Open

10:00-4:00 / Room TBD

Come enjoy our digital playground.

None

Extracting the Attacker: Getting the Bad Guys Off Your SaaS David Branscome

Microsoft Partner Technical Architect Defensive / Technical A look at ways attackers implant themselves in cloud solutions and how to monitor for and remove them. 10:00-11:00 / Room TBD

10:30 am

security

Secure Coding Tournament Open

provided by SecureCodeWarrior 10:30-3:30 / Room TBD

Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play & Node.JS.

Make sure you bring your laptop!

The Top 10 (unexpected) Ways I Pwn'd You Steve Campbell

Securicon Senior Security Consultant Offensive / Technical Penetration Testers have to get creative when testing environments where prior findings have been remediated or you're presented with very little attack surface. Follow along to my stories of the unexpected methods I’ve used to pwn systems and provide more value to my clients. Some of these will never be picked up by a scanner, or ignored due to a lack of appreciation for their impact. 10:30-11:30 / Room TBD

11:00 am

Awareness Endgame: Reducing Risk with Automation Colin James & Russell DeHennis

Florida Department of Economic Opportunity Defensive / Technical Most breaches begin with a phishing attack that could have been prevented with a strong user security awareness training program. You won't have to search the galaxy to find help turning your program from cosmic dust to JARVIS. Using a handful of tools and custom scripts, we further automated our awareness training program and integrated aspects of it into our risk management program. We will show how we did it and how your organization can too. 11:00-12:00 / Room TBD

12:00 pm

local_pizza

Lunch Served

must have lunch ticket 12:00-1:00 / Room TBD

Register by April 1 for included lunch!

12:30 pm

LUNCH KEYNOTE

CONNECT 1200: Hacking in Tallahassee circa 1980-1990s Champ Clark III

Quadrant Information Security Chief Technology Officer Offensive / History Did you know there was a “hacking” scene in Tallahassee in the late 1980s and 1990s? This talk intends to paint a picture of what is was like to be a hacker in Tallahassee during this period by telling stories about the "hacks" and the small group of people that were dedicated to the exploration of computer systems and networks. 12:30-1:30 / Room TBD

1:30 pm

Eyes In Our Children’s Bedrooms Sanchari Das & Joshua Streiff

Indiana University Bloomington Defensive / Science, Technology, Society & Compliance A presentation on original research into smart toy IoT vulnerabilities and penetration testing on smart toy products with a summary of the risks, vulnerabilities, and mitigations that can be deployed to better protect some of the most vulnerable users; children. 1:30-2:30 / Room TBD

2:00 pm

"Cracking" Up: Analyzing Organizational Password Security Falcon Street

Florida Department of Economic Opportunity CICO Defensive / Technical This talk will look at how one organization worked to handle the ever-changing needs of password security requirements and NIST password recommendations by creating automated scripts and using specialized software and hardware to conquer weak passwords. 2:00-3:00 / Room TBD

2:30 pm

Show Me the Money Carlota Sage

Tulle Software & Services Defensive / Managerial & Compliance A how-to for smaller orgs to put together the financial justification for starting a security program and hiring security personnel. 2:30-3:30 / Room TBD

3:00 pm

Tales from professional thieves Dan McInerney & Justin Wynn

Coalfire Offensive / Technical A brief look at common and uncommon physical security bypasses that afflict many organizations and a rousing collection of tales from professional penetration testers who sometimes find themselves covered in poo or being chased by SWAT teams in the name of security. 3:00-4:00 / Room TBD

3:30 pm

Registration Closed

Secure Coding Tournament Closed

Operationalizing Threat Hunting using MITRE ATT&CK Framework Arun Warikoo

Defensive / Technical A walkthrough for how to operationalize the MITRE ATT&CK Framework and begin developing a threat hunting program. 3:30-4:30 / Room TBD

4:00 pm

Lockpick Village Closed

Cyber Range Closed

4:30 pm

mic

Closing Ceremony

4:30-5:00 / Room TBD

emoji_events

Secure Codeing Winners Announced

4:30-5:00 / Room TBD

Who will be crowned the Secure Code Warrior?

local_play

Door Prizes Announced

4:30-5:00 / Room TBD

Must be present to win.

5:00 pm

Doors Close