top of page

Schedule 2025

Day 1 


Track A

09:00–09:45

Keynote

Disrupting Scam Networks at Scale: Rethinking Cybersecurity for the Fraud Era

Prof Dali Kaafar​

​

9:45 - 10:30

Modern Identity Providers Under Attack: Tactics, Techniques, and Mitigations

Anurag Khanna

​

10:30–10:50 - Coffee Break

​

10:50–11:35

Prompting the Priorities: Evaluating LLMs for Smarter Vulnerability Triage

Muhammad Ikram

​

11:35–12:20

The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune

Jeffrey Gaor | Parameswaran Ganesan

​

12:20–13:20 - Lunch Break

​

13:20–14:05

Balancing Performance and Security: Open-Source Evaluation of Quantum-Secure Symmetric Key Agreement

Amin Rois Sinung

​

14:05–14:55 

Breaking the Mould: Women Thriving in Technical Roles

Paula Sillars | Alissa Borg

​

14:55–15:10 - Coffee Break

​

15:10–15:55

Error 404: Experience Not Required (When You Have a Homelab)

Kat Fitzgerald

​

15:55–16:40

How hackers automate attacks against cPanel for spamming and malware distribution

Robbie Abraham

​

16:40–17:25

Inside the APK: Hacking Android for CVEs and Exploits

Jack Sessions

​

Track B

​

09:45–10:30

Insider Threat: Tips and Tricks from a Bad Guy ™ as a Service

@MewSec

​

10:30–10:50 - Coffee Break 

​

10:50–11:35

Fog of War: What the Battle of Midway Can Teach Us About Modern Cyber Conflict

Kenny Zhong

​

11:35–12:20

Residential Proxies – what they are, how they are formed and detection methods

Adam Cassar

​

12:20–13:20 - Lunch Break

​

13:20–14:25

Your shortcut to cracking Windows registry forensics

Tonmoy Jitu

​

14:25–15:10

Leading in the AI Cyber Arms Race: Strategic Priorities for Security Leaders in 2025

Akhilesh Das​

​

 

Workshops
 
Day 1
13:00 - 17:00

Hunting the Unseen: Memory Forensics and Malware Detection through Windows Event Logs
Room M6.04

Muhammad Ikram

ESPHome is pretty neat. Making our own IoT Devices - Room M6.05

Ben Zhao

Active Directory Security Kerberos - Taming the hound of Haides - Room M4.06

Anurag Khanna

CANCELLED Hands on guide to mastering SPF, DKIM and DMARC to stop email spoofing and enhance email deliverability - Room M6.03

Michael Ko

​

CTF

Blue Team Workshop: Modern Network Attacks - Room M5.04

1:30 PM – 4:00 PM

​

Day 2

Track A

09:00–09:45

Breaking the Walled Garden: iOS Security Beyond the Sandbox

Jack Sessions

​

09:45–10:30

Going Solo: Thriving as a Single Professional in Cybersecurity

Kat Fitzgerald

​

10:30–10:50 - Coffee Break 

​

10:50–11:35

Decoding Threat Intel: How to Read and Understand Cyber Threat Reports as a Beginner

Mohaiminul Chowdhury

​

11:35–12:20

Securing the Cloud: Unveiling Vulnerabilities with AzurEye

Rishabh Gupta

​

12:20–13:20 - Lunch

​

13:20–14:05

Developing Your Own Local LLM (GenAI) for Cybersecurity GRC

Lee Yang Peng

​

14:05–14:55

Confound and Delay: Honeypot Chronicles from the Digital Battlefield

Kat Fitzgerald

​

14:55–15:10 - Coffee Break 

​

15:10–15:55

AI Threats: Building Your Human Firewall 2.0

Akhilesh Das

​

15:55–16:40

Chronicles of Threat Hunting… Taking down a Phishing as a Service provider

Robbie Abraham

​

16:40-17:25

AI Agent for Security Operations - ​​An Efficient Solution for Automated Alert Handling

Thanh Do | Thu Nguyen

​

Track B

09:00–09:45

The Trifecta of Email Authentication

Denice Vitorio

​

09:45–10:30

Blue Team Brokenness: Fixing the Things That Always Fail

Krishna Bagla

​

10:30–10:50 - Coffee Break 

​

10:50–11:35

Homegrown Cyber Ranges: What You Can Build With Almost Nothing

George Ferres

​

11:35–12:20

Prompted to Fail: Revealing the Hidden Dangers in Modern AI Systems

Anandan Krishnamoorthy

​

12:20–13:20 - Lunch Break

​

13:20–14:05

AI-Driven Threat Intel: Automate, Analyze, and Alert!

Arijit Paul​​

​

14:05 - 14:50

So You Want to Write a Book? Writing About AI Security For No Starch Press
Harriet Farlow

​

15:00-15:40

Career Panel: Change and Challenges

Alissa Borg, Paula Sillars, Kat Fitzgerald

​​​

Workshops 

​

Day 2
13:00. - 17:00

"The Invisible Threat: Why Everyday IoT Devices Are the New Security Battlefield" - Room M5.24

Rai Rai

I want to force piles of text into traditional ML models - Room M6.05

Ban Zhao

F*ck Security Maturity - Room M5.25

Carlota Sage

*Note: all workshops are open, first come basis

​

bottom of page