Opening Ceremony
Opening Keynote - Presented by Ed Skoudis
DerbyCon Story Time Panel
Dynamic Risk Taking and Social Engineering
Metasploit Town Hall Finale
Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.
Bypassing MacOS Detections With Swift
IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough
Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits
I PWN thee, I PWN thee not!
BloodHound From Red to Blue
Offensive Machine Learning for Pentesters and Red Teams
SCADA: What the next Stuxnet will look like and how to prevent it
“How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question
Scientific computing for information security – forging the missing link
Azure Sentinel - A first look at Microsoft's SIEM Solution
Designing & building a stealth C2 LDAP channel
There's No Place like (DUAL)Homed.
To CORS! The cause of, and solution to, your SPA problems!
Defeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs
Behavioral Security and Offensive Psychology at Scale
Modlishka - Is a Mantis Eating 2FA's Lunch?
Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape
Not A Security Boundary: Breaking Forest Trusts
The Hackers Apprentice
PowerShell Security: Looking Back from the Inside
It Must Be Fancy Bear!
Getting the most out of your covert physical security assessment - A Client’s Guide
Enabling The Future (Panel)
How to Tell the C-Level Their Baby is Ugly
Cyber false flags and adversarial counterintelligence, oh my…
Getting dirty on the CANBUS
Automated Dylib Hijacking
Phishing past Mail Protection Controls using Azure Information Protection (AIP)