CircleCityCon 9.0: Saturday Morning Cartoons

Friday, September 16 2022 8:00 AM - Sunday, September 18 2022 5:00 PM [EDT]

241 W. Washington St, Indianapolis, IN, 46204, United States

Register Now

1. Select Seats

2. Review and Proceed

Days
Hours
Minutes
Seconds

Registration

Sale ended

3rd Round Attendee Partial Approval - $175.00

sales ended

Student Partial Approval - $50.00

Must use .edu address to sign up. Use discount code at checkout SponsoredStudent to see if a free ticket is available!

Sale ended

Kids Partial Approval - Free

Must be 5 years of age or older up through and including 17 years of age. All kids must be accompanied by a ticketed parent or guardian at all times.

sales ended

Sponsor Partial Approval - Free

Available only to sponsors for sponsor reps at their booth.

Sale ended

Complementary Partial Approval - Free

sales ended

Sponsor Guest Partial Approval - Free

This is for guests of our sponsors. If you do not have a code for this ticket, please reach out to your sponsor contact to get the code.

Sale ended

Trainer Partial Approval - Free

sales ended

Villager Partial Approval - Free

Sale ended

Speaker Partial Approval - Free

sales ended

Plus One Partial Approval - Free

Sale ended

Staff Partial Approval - Free

sales ended

Volunteer Partial Approval - Free

Enter your discount code

  • Subtotal (excluding fees and discounts)
  • Fee
  • Total amount

Friday, September 16 2022 8:00 AM - Sunday, September 18 2022 5:00 PM [EDT]

Westin Indianapolis, 241 W. Washington St, Indianapolis, IN, 46204, United States.

We're Back!

CircleCityCon 9.0 is coming and will be in person! Yes, Indianapolis' premier Information Security conference is back and better than ever! Due to the past 2 years running virtual conferences, we have learned many things we would not have otherwise and plan on implementing some of the content ideas that were successful in 2019 and 2020. You can view our website circlecitycon.org as well as our Twitter @CircleCityCon to keep up to date on the happenings with the conference!

 

Room Block Available

We have rooms available at the Westin for you to attend the conference. Please book using this link https://book.passkey.com/event/50284606/owner/1680/home?mobile=true&dw=412

Student Tickets are now $50! Sponsor a Student also available.

Being a 501c3 organization, it is important to provide opportunities to students to expand their skills, networking, and community engagement. Reducing the ticket price is a key way we are trying to make it easier for students. You can help as well! If you would like to support a student by buying their ticket, please send a $50 donation via the Donorbox campaign on our website CircleCityCon.org and click the donate button.

 

Everytime you donate $50, we will increase the capacity of our special discount code by 1 ticket so a student can claim the ticket.

 

 Presentations

CFP is now closed.  Please be patient as we work on the schedule!

 

Trainings

The training schedule is up!  All trainings have been added along with trainer bios.  Go check it out!

 

Sponsors

Do you represent a company that would like to support an infosec conferece bringing tons of great content to hundreds of professionals? We have many opportunities for you to sponsor the conference and receive the ability to engage with our diverse, passionate audience. You can check our sponsors page at circlecitycon.org or at this link https://circlecitycon.org/wp-content/uploads/2022/01/Sponsor-Prospectus-CircleCityCon-9.0.pdf for a copy of the prospectus.

 

Thank you in advance for your support!

 

 

See YOU (yes you!) at the con!

 

C3 Conferences INC

https://CircleCityCon.org

C3 Conferences INC is a 501c3 non-profit that organizes CircleCityCon, Indianapolis' annual Information Security Conference to enable those in, or wishing to join, the Information Security workforce to attain training and education regarding Information Technology, Information Security, and similar topics. We also provide grants and programs for the purpose of educating Information Security practitioners and those interested in entering the field.

Contact the Organizer View other events

Tina Shakour
Senior Security Success Manager
AWS / Amazon

Tina has over 20 years in the tech world and been in sales, executive, and engineering roles. With a career that started in IT and Network Engineering, she now helps customers migrate to the cloud quickly and securely. She volunteers with the US Department of State Program - TechWomen - and coaches folks on how to gain a foothold or pivot in to a career in tech. She is a contestant and judge for the TraceLabs OSINT Global Search parties to help find missing persons. She is also currently a member of the staff on the Republic of Hackers.

About Tina Shakour

Senior Security Success Manager
AWS / Amazon
Matt Scheurer
Host
ThreatReel Podcast

Matt Scheurer is a show host for the ThreatReel Podcast, and works on a Computer Security Incident Response Team (CSIRT) performing Digital Forensics and Incident Response (DFIR). Matt has more than twenty years of combined professional experience in Information Technology and Information Security. He is a "Hacking is NOT a Crime" Advocate, volunteers as a technical mentor for the Women's Security Alliance (WomSA), and is a 2019 comSpark “Rising Tech Stars Award” winner. Matt has presented on numerous Information Security topics at many technology meetup groups and prominent Information Security conferences across the country.

About Matt Scheurer

Host
ThreatReel Podcast
Micah Brown
Host
ThreatReel Podcast

By day, Micah K. Brown is a member of the IT Security Engineering team at the Munich RE Group focused on building out the next generation of IT security services and IT security controls. By night, Brown serves on the Greater Cincinnati ISSA Chapter as Vice President and has had the honor to present at many diverse and prestigious IT security conferences.

About Micah Brown

Host
ThreatReel Podcast
Jeff Man
Information Security Evangelist
Online Business Systems

Respected Information Security advocate, advisor, evangelist, international speaker, keynoter, former host of Security & Compliance Weekly, co-host on Paul's Security Weekly, Tribe of Hackers, TOH Red Team, TOH Security Leaders, TOH Blue Team, and currently serving in a Consulting/Advisory role for Online Business Systems. Nearly 40 years of experience working in all aspects of computer, network, and information security, including cryptography, risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. Certified NSA Cryptanalyst. Previously held security research, management and product development roles with the National Security Agency, the DoD and private-sector enterprises and was part of the first penetration testing "red team" at NSA. For the past twenty-five years has been a pen tester, security architect, consultant, QSA, and PCI SME, providing consulting and advisory services to many of the nation's best known companies.

About Jeff Man

Information Security Evangelist
Online Business Systems
Sam Bowne
Instructor
City College San Francisco

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, Black Hat USA, HOPE, BSidesSF, BSidesLV, RSA, and many other conferences and colleges. He founded Infosec Decoded, Inc., and does corporate training and consulting for several Fortune 100 companies, on topics including Incident Response and Secure Coding.

About Sam Bowne

Instructor
City College San Francisco
Darryl Togashi
Cybersecurity Faculty
Purdue University Global

Professor Togashi worked in industry for over 20 years from cabling networks to managing international project teams. He has taught since 2005; his more recent focus on cybersecurity has allowed him to become a member of Indiana’s Governor’s Council on Cybersecurity and Vice-President of InfraGard Indiana working with the education sector. Professor Togashi is an AWS Certified Cloud Practitioner and a Computer Hacking Forensic Investigator. He is the Midwest Indiana State Director for CCDC (Collegiate Cyber Defense Competition) since 2016 and helping run the Midwest Regional CCDC competitions for the last few years.

About Darryl Togashi

Cybersecurity Faculty
Purdue University Global
Adrian Henry
Cybersecurity Analyst
Brotherhood Mutual

Cybersecurity student at Indiana Tech and recently got hired as a Cybersecurity professional at Brotherhood Mutual.

About Adrian Henry

Cybersecurity Analyst
Brotherhood Mutual
Brandon DeVault
Sr. Security Author
Pluralsight

Brandon DeVault is an Sr. Security Author focusing on general blue team operations, incident response, and threat hunting at Pluralsight. He is also a member of the Florida Air National Guard and works as a threat hunter on a Mission Defense Team (MDT) defending North America’s air tracks. Prior to joining Pluralsight, Brandon worked with Elastic as an Education Architect creating and delivering security content. He also worked with Special Operations Command where he had two deployments to Afghanistan on deployable communications teams. His experience spans satellite communications, radio technologies, system and network administration. Brandon is also passionate about hardware hacking, soldering, hiking, and currently holds the GCIA, GCED, and Elastic Engineering certifications.

About Brandon DeVault

Sr. Security Author
Pluralsight
Joe Schottman
Principal Security Engineer
Truist

Joe Schottman has worn most hats in IT and Security. He's spoken and given training on topics such as Purple Teams, API security, Web Shells, Web Threat Hunting, and more at AppSec Village at DEF CON, OWASP Global, SANS Summits, various BSides, Circle City Con, and other events.

About Joe Schottman

Principal Security Engineer
Truist
Amélie Koran
itinerant troublemaker and security loudmouth
webjedi

Sayer of things, do’er of stuff - itinerant troublemaker and security loudmouth - Amélie hails from multiple decades of living and dealing with tech and security in the private, public and academic sectors. Currently employed by both a large global digital entertainment company, but also a DC think tank, she’s trying to make sense of, and her own way through this technological mess we make for ourselves daily. Recovering systems engineer, public servant, and part-time policy wonk, she tries to bring the reality of having “done the thing” to larger discussions by those trying to help steer the ship. At best, throwing things around to see what sticks, typically on Twitter at @webjedi, but occasionally on a podcast, or at a conference near you.

About Amélie Koran

itinerant troublemaker and security loudmouth
webjedi
CCC Staff
Staff
Circle City Con

About CCC Staff

Staff
Circle City Con
Rick Davis
Senior Customer Engineer
Microsoft

Rick Davis is currently a Senior Customer Engineer at Microsoft focusing on Cybersecurity. With over 20 years in the field he has worked in all industry verticals including public, private and federal sectors in roles ranging from architecture to red team as well as adjunct professor and guest lecturer in areas of statistics, number theory and cryptanalysis. In addition to proactively working with customers to deploy security tools, train staff and better defend their environments Rick works with Microsoft's global Incident Response team responding to some of the largest threats, ransomware outbreaks and other cybersecurity events. He is a subject matter expert on key technologies such as PKI, Active Directory and the Microsoft Defender ecosystem.

About Rick Davis

Senior Customer Engineer
Microsoft
Meag Lees
Pen Tester
Desert

Meag (@Witch_Sec,) is a pen tester from the desert. Pronouns are she/they. Chaotic Good. Let's be friends!

About Meag Lees

Pen Tester
Desert
Wolfgang Goerlich
Advisory CISO
Cisco

J. Wolfgang Goerlich is an Advisory CISO for Cisco. He has been responsible for IT and IT security in the healthcare and financial services verticals. Wolfgang has led advisory and assessment practices in cybersecurity consulting firms

About Wolfgang Goerlich

Advisory CISO
Cisco
Ryan Thompson
Sr. Intrusion Researcher
Crowdstrike

Ryan Thompson is currently working as a Senior Intrusion Researcher at Crowdstrike. His primary functions include conducting post-mortem analysis on hands-on intrusions and researching attacker techniques and trends. Previously, Ryan has worked as an Instructor at Elastic teaching the Air Force, Navy, and Army to conduct threat hunting using open source tools such as Kibana, Suricata, and Zeek. Before that, he was a Senior Security Analyst at Alert Logic providing weekly recommendations to clients using packet analysis, IDS alerts, and log-based investigations. He currently holds several SANS certs and is a TA for SANS FOR508 (GCFA).

About Ryan Thompson

Sr. Intrusion Researcher
Crowdstrike
Kevin Jackson
CEO/Founder
Level 6 Cybersecurity

Kevin E. Jackson is founder and CEO of Level 6 Cybersecurity, a startup company committed to making outcome-based cybersecurity a reality. Kevin has 30+ years of technology experience including executive leadership roles in cybersecurity consulting, information security strategy, compliance management, enterprise architecture, IT infrastructure, business intelligence, and IT program management. Kevin is also an Adjunct Professor teaching online business intelligence/data analytics program management classes at Villanova University.

About Kevin Jackson

CEO/Founder
Level 6 Cybersecurity
Kurt Waller
Sr. Cyber Threat Intel. Analyst
UPS

Kurt currently works as a Sr. Cyber Threat Intel. Analyst at UPS and holds certifications such as his CISSP, GXPN, GPEN, GNFA, GMON, Recorded Future Analyst and others. Graduating from the University of Louisville's School of Business in Computer Information Systems in 2013 he got his first role as a Systems Security Admin. and has since worked as a Penetration Tester and in Cyber Threat Intelligence. Kurt is also the founder and CEO of threatABLE.io which is a free curated feed of cyber related news and intelligence. Located out of Louisville, KY he mainly focuses on his family life outside of work, with hobbies including playing video games and watching mixed martial arts.

About Kurt Waller

Sr. Cyber Threat Intel. Analyst
UPS
Justin Spencer
Principal Software Enginee
Hellebore Consulting Group

Justin Spencer is a hacker and Principal Software Engineer at Hellebore Consulting Group where he provides training, solutions, and support across a variety of security focus areas, including application and system security, for multiple DoD clients. Mr. Spencer has a decade of experience performing software development, security assessments, reverse engineering, red team tool development, signal analysis, and SDR transceiver design. He was previously an adjunct Cyber Academy instructor and Manager of Cyber Software Engineering at Northrop Grumman. Mr. Spencer is also a USMC veteran and an alumnus of the Purdue University Computer Engineering program.

About Justin Spencer

Principal Software Enginee
Hellebore Consulting Group
Nader Zaveri
Senior Manager - Incident Response & Remediation
Mandiant Inc.

Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has assisted client’s incident response investigations to help investigate and understand the storyline of the attack for most allusive nation-state threat actors that are associated with infamous on-prem and cloud-based breaches. He also leads the remediation efforts with his knowledge and experience by providing strategic short, medium, and long-term remediation recommendations to directors and C-level executives. He also leads the efforts in providing tactical recommendations to specialists, to improve the security posture of an organization. Nader also has experience with leading transformational projects over infrastructure and processes with technical and organizational change components in response to rapidly evolving business needs and regulatory requirements. Nader Zaveri conducted interviews and presentations for dozens of organizations and conferences regarding cloud and on-prem Incident Response and Remediation topics. He regularly provides security updates and briefings to C-Suite personnel during and after an incident, as well as assist with post-remediation and hardening efforts for the organization. Prior to joining Mandiant, Nader Zaveri spent several years in leadership positions at major cyber security consulting firms. Before joining consulting, Nader worked as a lead practitioner for multi-national organizations.

About Nader Zaveri

Senior Manager - Incident Response & Remediation
Mandiant Inc.
Chris Culling
Senior Technical Success Manager
Gigamon

I currently work for Gigamon as a Senior Technical Success Manager. I’m retired U.S. Army (Military Intelligence), live in Stevensville, Maryland, and have been working as a government contractor for the last ten years in the areas of operations management, SOC operations, and CTI analysis. I’ve been married for 31 years to a very patient woman, have three adult children (two who are married and have yet to bless me with any grandkids), two cats, a dog, and a Vietnamese pot-bellied pig. I'm also a recovering alcoholic. Once I finally received a diagnosis of severe ADHD, anxiety, and depression at age 48, I was able to stop self-medicating and receive the help I truly needed to overcome my addiction and begin understanding my neurodiversities.

About Chris Culling

Senior Technical Success Manager
Gigamon
Tyler Uffelman
Threat Hunter
Allegion PLC

Tyler W. Uffelman is a threat hunter at Allegion PLC with over 5 years experience working in security monitoring including the following industries: government contractor, MSSP, publicly traded OT/ICS organization. Additional experience includes a masters degree in cyber security, CySA+ certification, and a published IEEE IoT researcher.

About Tyler Uffelman

Threat Hunter
Allegion PLC
Alex Martirosyan
Senior Penetration Tester
Wolf & Company, P.C.

Alex is a Senior Penetration Tester at Wolf’s IT Assurance Services group where he’s responsible for coordinating and conducting penetration testing services for clients in a variety of industries, including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, threat emulation exercises, social engineering, vulnerability assessments, cloud security assessments, and Active Directory security reviews. Additionally, he has experience working with standards from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS), and leveraging the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework. Alex has over three years of experience performing security assessments and holds certifications from industry-recognized organizations such as Offensive Security and Global Information Assurance Certification (GIAC).

About Alex Martirosyan

Senior Penetration Tester
Wolf & Company, P.C.
Doug Kras
Penetration Tester
N/A

With a background in penetration testing, I made the change to becoming an IoT pentester. With 0 hardware, IoT experience, reverse engineering experience, I quickly learned how to find critical risk vulnerabilities in products. Having a curious mindset, has allowed me to pose questions on what if I supplied this data to this program, what would happen. Sometimes that leads to gaining code execution on devices. I love learning new things, and continually am reading up on the latest hacking news!

About Doug Kras

Penetration Tester
N/A
Caitiln Kiska
Sr. CSIRT Analyst
Target

Caitlin has split her time in cybersecurity between IR and threat intel teams. She enjoys researching incident response procedures employed by other industries as a way to reduce duplication of effort. Outside of work she is an avid bird watcher and has seen over 1200+ species of birds.

About Caitiln Kiska

Sr. CSIRT Analyst
Target
Ray Davidson
Program Manager
Michigan Cyber Civilian Corps

Ray Davidson served as dean at the SANS Technology Institute during its founding, and now leads the Michigan Cyber Civilian Corps, which is currently the only civilian state sponsored team of incident responders in the country. He continues to serve as a mentor, subject matter expert and technical reviewer for the SANS Institute, and for anyone else who will listen. He holds a doctorate in Chemical Engineering, and several infosec certifications. He has worked as a paperboy, gymnastics instructor, telephone information operator (in the days before Directory Assistance), research scientist and he has led global security projects for a major pharma company. He has been a college professor, and has cofounded a security startup. Mostly he is passionate about empowering others to do the right thing. And dance.

About Ray Davidson

Program Manager
Michigan Cyber Civilian Corps
Catherine Ullman
Sr. Information Security Forensic Analyst
University at Buffalo

Dr. Catherine J. Ullman is a security researcher, speaker, and Senior Information Security Forensic Analyst at University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a digital forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness among faculty and staff via a department-wide program which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at numerous information security conferences including DEF CON and BlueTeamCon. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo Zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.

About Catherine Ullman

Sr. Information Security Forensic Analyst
University at Buffalo
woland @
Pentester
RedLegg

woland is a ex-investigative journalist turned bartender turned pentester. In her spare time she enjoys boxing, the outdoors, and tiki drinks

About woland @

Pentester
RedLegg
Joseph Sarkisian
Lead Penetration Tester
Wolf & Co., P.C.

Joe serves as the Lead Penetration Tester on Wolf & Company’s Information Technology (IT) Assurance Team. Joe is responsible for coordinating and conducting penetration testing services for clients in a variety of industries including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, social engineering, vulnerability assessments, Microsoft Windows security and management audits, and general information security and controls. Joe has over 4 years experience conducting penetration testing audits and is pursuing ethical hacking certifications from industry-recognized organizations like the SANS Institute and Offensive Security.

About Joseph Sarkisian

Lead Penetration Tester
Wolf & Co., P.C.
Stefani Goerlich
Founder & Clinical Director
Bound Together Counseling

Award winning author of The Leather Couch: Clinical Practice with Kinky Clients and it's advanced practice sequel, Kink-Affirming Practice: Culturally Competent Therapy from The Leather Chair, Stefani describes herself as an expert on the edges and a bridge builder between the margins and the mainstream. Stefani is an expert in working with Gender, Relationship, and Sexually Diverse folks as well as religious minorities and has over 15 years experience in supporting survivors of domestic and sexual trauma. A Clinical Social Worker licensed in Michigan, Ohio, and Arizona, she has worked with high-risk young people, commercial sex workers, and survivors of human trafficking and currently owns and operates a boutique private sex therapy practice based in Michigan. A Board Certified Diplomate of Sexology and Certified Sex Therapist, Stefani earned a Masters in Social Work from Wayne State University, where she specialized in Cognitive Behavioral Therapy, completed her Post-Graduate Certificate in Sex Therapy at the University of Michigan (where she is on the teaching faculty of the Sexual Health Certificate Program) and holds a PhD in Clinical Sexology. She is an author, educator and an expert voice for Cosmopolitan, The New Yorker, The New York Post, Shape, Women's Health, Marie Claire, The American Spectator, and many more. Stefani is currently writing her 4th and 5th books and completing a Graduate Certificate in Cyber Criminology with a special interest in cyber deviance and online sexuality.

About Stefani Goerlich

Founder & Clinical Director
Bound Together Counseling
Solomon Sonya
Director Cyber Operations Training
Organization

Solomon Sonya (@Carpenter1010) is the Director of Cyber Operations Training at a large organization. He has a background in software development, malware analysis, covert channels, steganography, distributed computing, computer hacking, information protection paradigms, and cyber warfare. He received his Undergraduate Degree in Computer Science and has Master’s degrees in Computer Science and Information System Engineering. Before becoming Director of Cyber Operations Training, he was a university Computer Science Assistant Professor of Computer Science and Research Director. Solomon’s current research includes computer system exploitation, cyber threat intelligence, digital forensics, and data protection. Solomon's previous keynote and conference engagements include: BlackHat USA, SecTor Canada, Hack in Paris, France, HackCon Norway, ICSIS – Toronto, ICORES Italy, BruCon Belgium, CyberCentral – Prague and Slovakia, Hack.Lu Luxembourg, Shmoocon DC, BotConf - France, DerbyCon Kentucky, SkyDogCon Tennessee, HackerHalted Georgia, Day-Con Ohio, and TakeDownCon Connecticut, Maryland, and Alabama, AFCEA – Colorado Springs.

About Solomon Sonya

Director Cyber Operations Training
Organization
Alyssa Miller
BISO
S&P Global Ratings

Alyssa Miller, Business Information Security Officer (BISO) for S&P Global, directs the global security strategy for the Ratings division, connecting corporate security objectives to business initiatives. She blends a unique mix of technical expertise and executive presence to bridge the gap that can often form between security practitioners and business leaders. Her goal is to change how we look at the security of our interconnected way of life and focus attention on defending privacy and cultivating trust. A life-long hacker, Alyssa has a passion for technology and security. She bought her first computer herself at age 12 and quickly learned techniques for hacking modem communications and software. Her serendipitous career journey began as a software developer which enabled her to pivot into security roles. Beginning as a penetration tester, her last 15 years have seen her grow as a security leader with experience across a variety of organizations. She regularly advocates for improved security practices and shares her research with business leaders and industry audiences through her international public speaking engagements, online content, and other media appearances.

About Alyssa Miller

BISO
S&P Global Ratings
Circle City Con Board
Board
Circle City Con

About Circle City Con Board

Board
Circle City Con

About Sonatype

www.sonatype.com Sponsor Logo

About Red Canary

https://redcanary.com/ Sponsor Logo

About deepwatch

www.deepwatch.com Sponsor Logo

About Hurricane Labs

https://hurricanelabs.com/ Sponsor Logo

About No starch

https://nostarch.com/ Sponsor Logo

10:00 AM
Training 2

Full-Stack Incident Response

10:00 AM - 06:00 PM
  • Sam Bowne

    Instructor

Training 1

Ethical Hacking and Digital Forensics - Hands-On - Day 1

10:00 AM - 06:00 PM
  • +1
  • Darryl Togashi

    Cybersecurity Faculty

10:00 AM
Speaker Track 1

Opening Ceremony

10:00 AM - 10:50 AM
  • CCC Staff

    Staff

11:00 AM
Speaker Track 1

Whose Job Is It Anyway? - Opening Keynote

11:00 AM - 11:50 AM
  • Amélie Koran

    itinerant troublemaker and security loudmouth

01:00 PM
Speaker Track 1

PKI - Avoiding common pitfalls

01:00 PM - 01:50 PM
  • Rick Davis

    Senior Customer Engineer

01:30 PM
Training 3

The Art of the Jedi Mind Trick - Day 1

01:30 PM - 05:30 PM
  • Jeff Man

    Information Security Evangelist

02:00 PM
Speaker Track 1

Personal Privacy in an OSINT World

02:00 PM - 02:50 PM
  • Tina Shakour

    Senior Security Success Manager

03:00 PM
Speaker Track 1

Log4j Vulnerability: Emulation and Detection

03:00 PM - 03:50 PM
  • Brandon DeVault

    Sr. Security Author

04:00 PM
Speaker Track 1

After These Messages: Taking Security Awareness off the Air

04:00 PM - 04:50 PM
  • Wolfgang Goerlich

    Advisory CISO

05:00 PM
Speaker Track 1

"Let's See Who You Really Are!" The Mystery of the QR Code

05:00 PM - 05:50 PM
  • Meag Lees

    Pen Tester

10:00 AM
Training 3

Cryptography and Blockchain Security

10:00 AM - 02:00 PM
  • Sam Bowne

    Instructor

10:00 AM
Training 1

Ethical Hacking and Digital Forensics - Hands-On - Day 2

10:00 AM - 06:00 PM
  • +1
  • Darryl Togashi

    Cybersecurity Faculty

10:00 AM
Training 4

Building Security Automation Using Jupyter Notebooks

10:00 AM - 01:30 PM
  • Joe Schottman

    Principal Security Engineer

10:00 AM
Speaker Track 1

Keys to Staying Hidden: Defense Evasion with Windows Registry

10:00 AM - 10:50 AM
  • Ryan Thompson

    Sr. Intrusion Researcher

Speaker Track 2

The Case for Outcome-Based Cybersecurity

10:00 AM - 10:50 AM
  • Kevin Jackson

    CEO/Founder

11:00 AM
Speaker Track 1

Exploiting Advanced Volatile Memory Analysis Challenges for Fun and Profit

11:00 AM - 11:50 AM
  • Solomon Sonya

    Director Cyber Operations Training

Speaker Track 2

Minimum Viable AppSec

11:00 AM - 11:50 AM
  • Justin Spencer

    Principal Software Enginee

01:00 PM
Speaker Track 1

A Golden Ticket to the Cloud

01:00 PM - 01:50 PM
  • Nader Zaveri

    Senior Manager - Incident Response & Remediation

Speaker Track 2

Circle City Con Board Panel

01:00 PM - 01:50 PM
  • Circle City Con Board

    Board

01:30 PM
Training 2

The Art of the Jedi Mind Trick - Day 2

01:30 PM - 05:30 PM
  • Jeff Man

    Information Security Evangelist

02:00 PM
Training 4

Log4j Vulnerability: Emulation and Detection

02:00 PM - 06:00 PM
  • Brandon DeVault

    Sr. Security Author

02:00 PM
Speaker Track 1

A Day in the Life of a Threat Hunter

02:00 PM - 02:50 PM
  • Tyler Uffelman

    Threat Hunter

Speaker Track 2

Emulating Adversaries for Auditors and the Business

02:00 PM - 02:50 PM
  • Alex Martirosyan

    Senior Penetration Tester

03:00 PM
Speaker Track 1

Intro to IoT Hacking

03:00 PM - 03:50 PM
  • Doug Kras

    Penetration Tester

Speaker Track 2

Don’t Drown IR! Combatting the Dangers of Alert Fatigue.

03:00 PM - 03:50 PM
  • Caitiln Kiska

    Sr. CSIRT Analyst

04:00 PM
Speaker Track 1

We're not from the government, but we're here to help them help you

04:00 PM - 04:50 PM
  • Ray Davidson

    Program Manager

Speaker Track 2

EHLO is that you?

04:00 PM - 04:50 PM
  • Catherine Ullman

    Sr. Information Security Forensic Analyst

05:00 PM
Speaker Track 1

Password Attacks to Take Over the World

05:00 PM - 05:50 PM
  • woland @

    Pentester

Speaker Track 2

Making the case for SCA

05:00 PM - 05:50 PM
  • Alyssa Miller

    BISO

09:00 AM
Training 1

Introduction to Exploit Development

09:00 AM - 01:00 PM
  • Sam Bowne

    Instructor

10:00 AM
Training 2

Cloudy but Secure: Building a Secure VPC in AWS

10:00 AM - 12:00 PM
  • Tina Shakour

    Senior Security Success Manager

Training 3

Wireshark Workshop

10:00 AM - 12:00 PM
  • +1
  • Matt Scheurer

    Host

11:00 AM
Speaker Track 1

Whatever Happened Last Time, It Wasn't A Penetration Test

11:00 AM - 11:50 AM
  • Joseph Sarkisian

    Lead Penetration Tester

01:00 PM
Speaker Track 1

Digital Desire: A Brief History of Cyber Sex

01:00 PM - 01:50 PM
  • Stefani Goerlich

    Founder & Clinical Director

02:00 PM
Speaker Track 1

Hackers are Neither Created Nor Destroyed

02:00 PM - 02:50 PM
  • Jeff Man

    Information Security Evangelist

03:00 PM
Speaker Track 1

Closing Ceremony

03:00 PM - 03:50 PM
  • CCC Staff

    Staff

  • Integer nulla lorem, pellentesque eget eros malesuada, semper bibendum felis. Proin quis est egestas, ultrices purus tempor, aliquet erat. Nullam molestie, neque at hendrerit semper, dui lacus eleifend arcu, quis mattis augue leo condimentum dui. Nunc vehicula eleifend risus vitae luctus. Sed sed sem nibh. Nam sit amet massa ullamcorper, iaculis felis id, ullamcorper libero. Aenean aliquet orci quis nisi interdum faucibus. Maecenas sollicitudin, nunc vitae tempus feugiat, arcu elit egestas diam, sit amet maximus neque turpis ac quam. Curabitur at ligula eget turpis pellentesque vestibulum eu id ante. Cras eget turpis mauris. Vestibulum vitae quam elit. Suspendisse bibendum at ipsum nec tempor. Ut in tristique nibh. Aliquam erat volutpat. In hac habitasse platea dictumst.

    Vivamus tempor viverra enim, commodo faucibus quam porta sed. Sed et varius nunc. Fusce cursus sem nec tellus accumsan, sed laoreet nisi vulputate. Praesent varius quis turpis in aliquam. Phasellus nisl velit, porttitor eget risus sed, interdum elementum nibh. Praesent eget ante bibendum quam suscipit accumsan sit amet eu nisi. Ut eget facilisis risus. Proin molestie lorem ut interdum finibus. Sed pretium ut sapien at dictum. Sed sit amet dolor tincidunt turpis tincidunt ultricies et et neque.

    Nam non augue a lorem tempor sodales. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Quisque ullamcorper lobortis rhoncus. Morbi nec dui vitae odio ultricies posuere ac nec turpis. Vestibulum efficitur lectus sem, sed volutpat quam congue at. Nulla quis aliquam ex. Vestibulum eget felis consectetur, efficitur risus non, dapibus tellus. Aliquam ac gravida dui. Donec vel est a arcu tristique egestas id vitae neque. Nullam varius odio eget leo porttitor, pharetra rhoncus quam dignissim..