
Schedule 2025
Day 1
Track A
09:00–09:45
Keynote
Disrupting Scam Networks at Scale: Rethinking Cybersecurity for the Fraud Era
Prof Dali Kaafar​
​
9:45 - 10:30
Modern Identity Providers Under Attack: Tactics, Techniques, and Mitigations
Anurag Khanna
​
10:30–10:50 - Coffee Break
​
10:50–11:35
Prompting the Priorities: Evaluating LLMs for Smarter Vulnerability Triage
Muhammad Ikram
​
11:35–12:20
The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune
Jeffrey Gaor | Parameswaran Ganesan
​
12:20–13:20 - Lunch Break
​
13:20–14:05
Balancing Performance and Security: Open-Source Evaluation of Quantum-Secure Symmetric Key Agreement
Amin Rois Sinung
​
14:05–14:55
Breaking the Mould: Women Thriving in Technical Roles
Paula Sillars | Alissa Borg
​
14:55–15:10 - Coffee Break
​
15:10–15:55
Error 404: Experience Not Required (When You Have a Homelab)
Kat Fitzgerald
​
15:55–16:40
How hackers automate attacks against cPanel for spamming and malware distribution
Robbie Abraham
​
16:40–17:25
Inside the APK: Hacking Android for CVEs and Exploits
Jack Sessions
​
Track B
​
09:45–10:30
Insider Threat: Tips and Tricks from a Bad Guy ™ as a Service
@MewSec
​
10:30–10:50 - Coffee Break
​
10:50–11:35
Fog of War: What the Battle of Midway Can Teach Us About Modern Cyber Conflict
Kenny Zhong
​
11:35–12:20
Residential Proxies – what they are, how they are formed and detection methods
Adam Cassar
​
12:20–13:20 - Lunch Break
​
13:20–14:25
Your shortcut to cracking Windows registry forensics
Tonmoy Jitu
​
14:25–15:10
Leading in the AI Cyber Arms Race: Strategic Priorities for Security Leaders in 2025
Akhilesh Das​
​
Workshops
Day 1
13:00 - 17:00
Hunting the Unseen: Memory Forensics and Malware Detection through Windows Event Logs
- Room M6.04
Muhammad Ikram
ESPHome is pretty neat. Making our own IoT Devices - Room M6.05
Ben Zhao
Active Directory Security Kerberos - Taming the hound of Haides - Room M4.06
Anurag Khanna
CANCELLED Hands on guide to mastering SPF, DKIM and DMARC to stop email spoofing and enhance email deliverability - Room M6.03
Michael Ko
​
CTF
Blue Team Workshop: Modern Network Attacks - Room M5.04
1:30 PM – 4:00 PM
​
Day 2
Track A
09:00–09:45
Breaking the Walled Garden: iOS Security Beyond the Sandbox
Jack Sessions
​
09:45–10:30
Going Solo: Thriving as a Single Professional in Cybersecurity
Kat Fitzgerald
​
10:30–10:50 - Coffee Break
​
10:50–11:35
Decoding Threat Intel: How to Read and Understand Cyber Threat Reports as a Beginner
Mohaiminul Chowdhury
​
11:35–12:20
Securing the Cloud: Unveiling Vulnerabilities with AzurEye
Rishabh Gupta
​
12:20–13:20 - Lunch
​
13:20–14:05
Developing Your Own Local LLM (GenAI) for Cybersecurity GRC
Lee Yang Peng
​
14:05–14:55
Confound and Delay: Honeypot Chronicles from the Digital Battlefield
Kat Fitzgerald
​
14:55–15:10 - Coffee Break
​
15:10–15:55
AI Threats: Building Your Human Firewall 2.0
Akhilesh Das
​
15:55–16:40
Chronicles of Threat Hunting… Taking down a Phishing as a Service provider
Robbie Abraham
​
16:40-17:25
AI Agent for Security Operations - ​​An Efficient Solution for Automated Alert Handling
Thanh Do | Thu Nguyen
​
Track B
09:00–09:45
The Trifecta of Email Authentication
Denice Vitorio
​
09:45–10:30
Blue Team Brokenness: Fixing the Things That Always Fail
Krishna Bagla
​
10:30–10:50 - Coffee Break
​
10:50–11:35
Homegrown Cyber Ranges: What You Can Build With Almost Nothing
George Ferres
​
11:35–12:20
Prompted to Fail: Revealing the Hidden Dangers in Modern AI Systems
Anandan Krishnamoorthy
​
12:20–13:20 - Lunch Break
​
13:20–14:05
AI-Driven Threat Intel: Automate, Analyze, and Alert!
Arijit Paul​​
​
14:05 - 14:50
So You Want to Write a Book? Writing About AI Security For No Starch Press
Harriet Farlow
​
15:00-15:40
Career Panel: Change and Challenges
Alissa Borg, Paula Sillars, Kat Fitzgerald
​​​
Workshops
​
Day 2
13:00. - 17:00
"The Invisible Threat: Why Everyday IoT Devices Are the New Security Battlefield" - Room M5.24
Rai Rai
I want to force piles of text into traditional ML models - Room M6.05
Ban Zhao
F*ck Security Maturity - Room M5.25
Carlota Sage
*Note: all workshops are open, first come basis
​
