Version _9182025 Oct. 13, 2023
We released a new schedule version!
We sadly had to cancel a session: “How to setup my first Home Cyber Lab” by Professor Roger
Version _9182024 Oct. 9, 2023
We released a new schedule version!
We have a new session: “KSU BS-Cybersecurity Student of the Year award”.
Version _09182023 Sept. 18, 2023
We released a new schedule version!
We have new sessions!
- “How to setup my first Home Cyber Lab” by Professor Roger
- “ELF Binary Infection Attacks For Persistence and Heuristic Detection.” by Chad Delecia
- “Offer Comparisons to Make Informed Hiring & Career Decisions” by Amy Knoell
- “Hacker’s Guide to Starting Your Security Career” by Ayub Yusuf
- “Darkweb Business School” by Cory Wolff
- “Writing Your First SCAP Check” by Winston Messer, Ryan Parker
- “Threat Hunting on Budget - Using OSS to Hunt for the Unknown” by Jason Lawrence
- “From Checkbox to Checkmate: Winning the Game for Security Budgets” by Ryan Basden
- “DFIR 101 - Clones, drones, & prison phones” by Mike Judd
- “Where to Start? Start at the End...Point” by Belinda Mobley
- “Improving Incident Response or is it Incident Management.” by Reggie T Davis
- “Who Goes There? Actively Detecting Intruders With Cyber Deception Tools” by Dwayne McDaniel
- “Threat Intel for Effective Recovery” by Alex Dangel
- “The Art of Service: 5 Lessons Learned About Life, Leadership, and Business From Building a Cybersecurity Company” by Christian Hyatt
- “Building Your Cyber Defense in Storage Systems” by Nat Prakongpan
- “Lockpick Village”
- “Think like a magnet: how to attract, retain, and develop amazing people” by Jessica A Lucas
- “Hands off keyboard: Cyber Incident Commander primer” by Jorge Lopez
- “Stupid Log Tricks” by Matt Carothers
- “CMMC Who? The Basics of New DoD Cybersecurity Compliance” by Chris Silvers
- “Dissecting Linux malware from the Windows” by crudd
- “JAMBOREE: Java Android Magisk Burp Objection Root Emulator Easy” by Robert McCurdy
- “Sliver Me Timbers: A C2 Alternative to Cobalt Strike” by Steven Peterson
- “Unchained: Unraveling the Unconventional Security Threats in Web3” by Nick Kammerdiener
- “Bare Knuckle Forensics for White Knuckle Moments” by Tony Drake
- “Human Memory Management: Techniques for actionable security research” by Graham Helton
- “Pivoting into the Cloud” by Andrew Johnson
- “How I Learned to Stop Worrying and Build a Modern Detection & Response Program” by Allyn Stott
- “Cloud vulns and keys and breaches - Oh My!” by Jackson Reid
We have moved a session around: “Network King of the Hill” (Room 462 → Room 464)
Version 08282023 Aug. 28, 2023
We released our first schedule!