Loading…
Attending this event?
Streaming: https://mssvideo.vcu.edu/RVAsec
Tuesday, June 4
 

7:59am EDT

8:00am EDT

Breakfast - Day 1
After you get registered, come upstairs and enjoy breakfast!
Make sure you are in the ballroom by 9am for the welcome session.

Go see our vendors in the Expo!

Menu:
  • TBD

Tuesday June 4, 2024 8:00am - 9:00am EDT
Top of The Grand

9:00am EDT

Welcome Day 1

Welcome to RVAsec 13!

Remarks will be provided about what to expect at the conference and many thanks to our volunteers and sponsors for making it possible.

We will also have short presentations on CTF, Badge, and Lock Picking.


Speakers
avatar for Jake Kouns

Jake Kouns

Founder, RVAsec
Jake is the founder of RVAsec and was previously the CEO for Risk Based Security that provides vulnerabilities and data breach intelligence. He previously oversaw the operations of the Open Sourced Vulnerability Database (OSVDB.org) and DataLossDB. Kouns has presented at many well-known... Read More →


Tuesday June 4, 2024 9:00am - 9:30am EDT
Ballroom

9:30am EDT

Keynote
Speakers
avatar for Kymberlee Price

Kymberlee Price

Founder + CEO, Zatik
Kymberlee is co-founder and CEO of Zatik Security, a fractional product security consulting company whose mission is to make world-class cybersecurity expertise available to companies of all sizes. A dynamic engineering leader and public speaker known for developing high-performing multidisciplinary teams, Kymberlee is a recogn... Read More →


Tuesday June 4, 2024 9:30am - 10:30am EDT
Ballroom

10:00am EDT

HackRVA Badge Training & Repair
Come learn about your badge, get it fixed if there are any issues and talk to HackRVA!

HackRVA is a member-run and organized non-profit makerspace in Richmond, Virginia. HackRVA is a space filled with tools, computers, and people who like to build, invent, tinker, expand their minds, and learn and share new skills. You’ll find a diverse group of individuals who are into electronics, woodworking, embedded software, metalworking, programming, music, art, video, photography, 3D printing, sewing, textiles, and virtual reality—and that’s for starters. HackRVA members have access to the makerspace, tools, community and learning opportunities through member-lead workshops, events and projects.

Tuesday June 4, 2024 10:00am - 4:30pm EDT
Rappahannock

10:00am EDT

Lock Picking Village and Contest
A variety of example locks, from simple to extremely hard, along with a picks of all shapes and sizes will be available in our lock pick village.

Stop by and have some fun testing your skills! Provided hand sanitizer will be required to help reduce the modern risks while we explore the oldest security mechanism on earth!

If you fancy yourself a strong picker or have a competitive streak, we are planning to have a time contest of a series of locks, with the fastest through them all taking home something epic.

Tuesday June 4, 2024 10:00am - 5:00pm EDT
Rappahannock

10:30am EDT

Vendor Break & Room Change
Break and room change.

We need all attendees to leave both ballrooms quickly as possible so we can split the room for sessions.

Go see our vendors in the Expo!

Menu:
  • TBD


Tuesday June 4, 2024 10:30am - 11:00am EDT
Potomac

10:30am EDT

Registration
After the initial rush of registration in the moving, it will be relocated to the "Top of the Grand".
If you have any questions or issues please stop by for help.

This is also where you can turn in your Passport for Prizes.

WiFi sponsored by RVAsec: Omni Meeting Password: PASSWORD SOON

Tuesday June 4, 2024 10:30am - 5:00pm EDT
Top of The Grand

11:00am EDT

Secure Legends GameDay - A Cloud Security Danger Room
The Secure Legends GameDay experience provides an interactive learning exercise for security professionals to develop practical skills for protecting cloud environments. We will explore real-world security scenarios that might include compromised credentials, data leaks, instance breaches, infrastructure attacks, and vulnerable CI/CD pipelines.

During this session, we’ll solve one of the challenges together in realtime and I’ll explain the mitigation tactics as you work in your own environments. No cloud environments needed, no cloud bill to pay at the end, and no sign up necessary! You’ll get temporary access to a real environment where you can actually build.

As an added bonus, you’ll also get to walk away with limited-time access to that cloud account and to additional challenges you can solve after the session!  

Speakers
avatar for AM Grobelny

AM Grobelny

Principal Developer Advocate, GameDay, Amazon Web Services
I've spent the past 10+ years working on or helping people work on software. I was also a professional educator previously in my career, so I have a particular passion for helping people more easily understand difficult concepts. I currently work at AWS, and I'm focused on helping... Read More →


Tuesday June 4, 2024 11:00am - 11:15am EDT
1st Floor, Magnolia Room

11:00am EDT

Prioritization Myths Busted with Better Vulnerability Data
A good prioritization plan should let you know where to start when tackling risk. And yet, people don't know where to start when developing a good prioritization plan! Even worse, we make a number of bad assumptions when trying to navigate this labyrinth.

Which method is the best? Are many methods better than one? How many is too many? What does “best” even mean?

Ask 10 different practitioners these questions and you might get 10 different answers. There’s no better example of this situation than with the plethora of vulnerability prioritization methods available today. Luckily, we’ve been able to collect an unprecedented amount of data on vulnerabilities, and it’s taught us a lot about what makes sense, and what doesn’t.

Join us as we use this vulnerability data to dispel myths, avoid pitfalls, and conjure some solid recommendations that will put you on a better path.

Speakers
avatar for Ben Haynes

Ben Haynes

Data Scientist, Flashpoint
Ben Haynes is a data scientist at Flashpoint, leveraging analytics and his cybersecurity expertise to solve practical problems in the industry. Previously, he worked at Risk Based Security, where he dedicated his time to enhancing and implementing the organization’s cybersecurity... Read More →


Tuesday June 4, 2024 11:00am - 11:50am EDT
Ballroom A/B

11:00am EDT

That Shouldn't Have Worked - Payload Development
The game of bypassing defenses and detection continues to be a cat and mouse game. Attackers often find clever ways to use common tools and techniques to execute their code and the defenders continue to create detections and mitigations for these methods. As a red teamer, it is becoming increasingly difficult to get around these defenses and emulate those attackers. In this talk, I will cover some of the methods we use during engagements to thread the needle and bypass those defenses.

Speakers
avatar for Corey Overstreet

Corey Overstreet

Senior Security Consultant, Red Siege
Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare and is widely recognized for his in-depth OSINT talks and workshops. Additionally, he is a Black Hat trainer and has spoken at conferences... Read More →


Tuesday June 4, 2024 11:00am - 11:50am EDT
Ballroom C/D

11:50am EDT

Lunch
TBD

Tuesday June 4, 2024 11:50am - 1:00pm EDT
James River Foyer

1:00pm EDT

Its Coming From Inside the House: A Guide to Physical Facility Penetration Testing
Physical security is crucial to any organization; however, physical security sometimes takes a back seat. Many companies still maintain a physical office presence, and protecting employees working from the office, along with other critical assets is vitally important as protecting networks. An attacker gaining access into a building through social engineering or other means of physical entry could jeopardize those critical assets and employee’s safety. Attackers may access unattended workstations, open file cabinets, server rooms, or other information inside the organization. Skilled attackers may only need a few moments to slip into a building and plant a remote access device on the network without anyone noticing they were in the building.

Speakers
avatar for Ariyan Suroosh

Ariyan Suroosh

Senior Security Consultant, Optiv
Ariyan Bakhti-Suroosh is a senior security consultant on the Attack and Penetration team under Optiv’s Threat Management divison. Ariyan has a diverse background in information technology caused by an exigent curiosity for how things work. Ariyan has over 5 years of experience in... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
1st Floor, Magnolia Room

1:00pm EDT

Verified for Business Continuity: How to Remediate Risk Safely Across the Enterprise
Remediation can feel like a high-wire act, balancing the need to close exposures against the imperative of maintaining business continuity. This talk addresses the quintessential challenge: how can organizations utilize their existing arsenal of security tools to remediate vulnerabilities, misconfigurations, and exposures without halting the business engine? Glean insights from a seasoned industry expert on leveraging security logs, configurations, and threat intelligence to unearth exposures, teaching CISOs to navigate this delicate balance.

Speakers
avatar for Oren Koren

Oren Koren

CPO & Co-Founder, Veriti Security
Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
Ballroom C/D

1:00pm EDT

Some Assembly Required: Weaponizing Chrome CVE-2023-2033 for RCE in Electron
In this presentation, the development process of a remote code execution (RCE) exploit for CVE-2023-2033 is discussed. CVE-2023-2033 is an N-day type confusion vulnerability that affects Google Chrome for Windows, Mac, and Linux with which an attacker can exploit Chrome V8 engine to cause heap corruption via a crafted HTML page and gain RCE. Prior to this presentation, a public RCE exploit for this vulnerability did not exist. This exploit is based on publicly available proof of concept code that uses this vulnerability to implement v8 heap read/write/addrof primitives. This presentation focuses on weaponizing these primitives to achieve remote code execution consistently on an unsandboxed renderer process of an Electron version running a vulnerable version of Chrome. Methods to hijack the render process instruction pointer and to write and execute specially encoded chunks of shellcode using these primitives are discussed.

Speakers
avatar for Nick Copi

Nick Copi

AppSec Engineer, CarMax
Nick Copi, an application security engineer at CarMax, seamlessly balances his professional role with a fervent pursuit of security research. From architecting full-stack web applications to spearheading innovative security initiatives at CarMax, Nick's diverse background enriches... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
Ballroom A/B

1:00pm EDT

CTF Prep
Come prep and learn more about the CTF contest!

Tuesday June 4, 2024 1:00pm - 4:00pm EDT
Shenandoah Room

1:50pm EDT

Vendor Break
Go see our vendors in the Expo!

  • Milk & Cookies:  Warm Mini Cookies Vegetarian
    • Cold Milk
    • Chocolate Milk


Tuesday June 4, 2024 1:50pm - 2:00pm EDT
Potomac

2:00pm EDT

The ABCs of DevSecOps
Application Security is the most oft-ignored, yet critically vulnerable attack vector in many businesses today.  Development teams are encouraged to create new features first and foremost, at the expense of fixing vulnerabilities.  It’s not until a breach or an audit finding when they pay attention to patching security holes.  

So how does a thoughtful CISO get in front of this?

Application security has to exist across the application lifecycle. DevSecOps is the philosophy of imbuing proper security controls at every stage of the Software Development Lifecycle (SDLC).  This session will introduce you to core DevSecOps concepts so you can bring them back to your company and make some proactive changes to “drive defects left” and reduce the risk of a catastrophic security breach in your applications

Speakers
avatar for Steve Pressman

Steve Pressman

President and CTO, Alpine Cyber Solutions
Steve is an experienced computer systems and security architect with a passion for standards-based security and compliance; cloud computing; and DevSecOps. He brings over a decade of experience in the defense industry, working for multiple federal defense contractors, and has directly... Read More →


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
Ballroom A/B

2:00pm EDT

Once Upon a Cyber Threat: The Brothers Grimms Teachings on APT Awareness
Two hundred years ago, the first volume of fairy tales was published by the Brothers Grimm, introducing to the world a realm of magic, dark forests, and powerful villains to haunt everyone's dreams.  

We never imagined this realm would exist in the digital age. "Once Upon A Cyber Threat"  delves into the realm of advanced persistent Threat Groups (APTs), drawing parallels between the world of poisoned apples, breadcrumb trails, and magic mirrors and today's modern cyber threats. Serving not a tale of caution but a call to action and a lesson in storytelling, creating an outline that can help every security professional impart the caution, wisdom, and resilience we need to become the narrators that transformed Brother Grimm's tales into the happy ever after stories we know today.

Speakers
avatar for Ell Marquez

Ell Marquez

Researcher, Operation Safe Escape
Ell Marquez is a proud Hacking Is Not and Crime and Operation Safe escape advocate. She has traveled the world for five years, educating security practitioners on subjects from on-prem infrastructure to the cloud and everything in between. I've traveled the world educating security... Read More →


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
Ballroom C/D

2:00pm EDT

Consumer Routers Still Suck
You know that little box in the corner of your house doing all the heavy lifting required to connect you (and, now that everyone is working from home, your company) with the rest of the world? Yeah, that one. It’s no secret that these things are oftentimes security nightmares for consumers, but have ISPs or the various networking vendors improved things over the years, or are they still just as terrible as we all think they are?

Over the last few years, we’ve done a deep dive into many of these devices to see what makes them tick and evaluate the risks posed to consumers. In this talk, we’ll provide a rapid fire assessment of a handful of these devices, showcase the commonalities between flaws discovered, shed some light on behind-the-scenes supply chain issues plaguing this industry, and discuss where we see things going from here.

Speakers
JS

Jimi Sebree

Security Researcher, Tenable
Jimi and Evan are security researchers at Tenable. Jimi got his start as a software engineer before moving into the security space. Evan's introduction in infosec from the Canadian Forces Reserves and he's been hooked ever since.


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
1st Floor, Magnolia Room

2:50pm EDT

Vendor Break
Go see our vendors in the Expo!

Menu:
  • Potato Chips & French Onion Dip - GF/Vegetarian




Tuesday June 4, 2024 2:50pm - 3:00pm EDT
Potomac

3:00pm EDT

Embracing My Inner Cyber Wizard To Defeat Impostor Syndrome
Impostor syndrome is a psychological phenomenon that makes you feel like a fraud, despite your achievements and qualifications. It can affect your confidence, performance, and well-being. In this talk, We will discuss Impostor Syndrome and I will share my Infosec journey and how I’ve worked on minimizing the effects of Impostor Syndrome over the course of my career. I will go into detail about the concept of the Hacker Grimoire and how it and a focus on documentation in general helped me to challenge my Impostor Syndrome. Additionally, We’ll take a peek into my Hacker Grimoire and also give you tips on how to get started with your own.

Speakers
avatar for Corey Brennan

Corey Brennan

Sr. Information Security Engineer, Virginia529
Ever since he blew a capacitor installing a Cd drive and causing a small fire in his first self-built computer, Corey has been obsessed with computer systems and how they work. After 13 years in the Infosec industry wearing just about every hat, from being in a SOC to hunting threats... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
Ballroom C/D

3:00pm EDT

Defending Against the Deep: Is Your Workforce Ready For Generative AI Adversaries?
Gain insight into the evolving landscape of cybersecurity in the age of AI Generated Content. From defending against multi-vector cyber attacks to empowering your workforce through AI-powered cybersecurity awareness, Defending Against the Deep delves into the intricacies of Generative AI. Together, we will look at case studies, a technical demonstration of current capabilities, keys for leveling up your workforce, and an opportunity to test your ability to recognize AI Generated Content. In this talk, explore how the same technology used for malicious intent can be harnessed for good, offering innovative solutions to safeguard enterprise environments.

Speakers
avatar for Tucker Mahan

Tucker Mahan

Director Emerging Technology, MAXX Potential
Tucker currently leads emerging technology initiatives at MAXX Potential, expanding capabilities and coaching others to build careers in technology.He is a lifelong learner with a passion for all things Technology, and loves to share his ever-evolving knowledge on the subject. When... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
1st Floor, Magnolia Room

3:00pm EDT

Hacking Exchange From The Outside In
Microsoft Exchange 2019 uses the Oracle Outside-In libraries to parse specific file types when attached to emails. This talk covers the process of discovering memory corruption vulnerabilities within the technology using AFL and Jackalope and the results of the fuzzing process.

Speakers
avatar for Ali Ahmad

Ali Ahmad

Senior Research Consultant, Atredis Partners
With over 5 years of experience in the information security industry, Ali has performed a wide variety of security assessments including network penetration testing, application security assessments, full-scope red team engagements, adversarial simulation, and physical penetration... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
Ballroom A/B

3:50pm EDT

Vendor Break
Go see our vendors in the Expo!

Menu:
  • Potato Chips & French Onion Dip - GF/Vegetarian

Tuesday June 4, 2024 3:50pm - 4:00pm EDT
Potomac

4:00pm EDT

Improv Comedy for Social Engineering
This workshop that introduces the techniques used in Improv Comedy and applies them to skills used in the OFFSEC field to enable the participants to better communicate, think on their feet, and gain confidence when operating in the unknown.

Speakers
avatar for Ross Merritt

Ross Merritt

Security Consultant, Merritt
Ross Merritt is a U.S. Marine Corps Veteran, Former Private Investigator, Performing Comedian, and a Cyber Security Consultant at Blue Bastion specializing in Social Engineering and OSINT.


Tuesday June 4, 2024 4:00pm - 4:50pm EDT
1st Floor, Magnolia Room

4:00pm EDT

Orion's Quest: Navigating the Cyber Wilderness - Tales of Modern Penetration Testing
Focusing on real stories from the trenches, Orion's Quest walks through a series of modern application and API attacks Kevin and his team have pulled off.  The talk describes how we found and exploited the flaws and provides information so you can test yourself.

Speakers
avatar for Kevin Johnson

Kevin Johnson

CEO, Secure Ideas
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions... Read More →


Tuesday June 4, 2024 4:00pm - 4:50pm EDT
Ballroom A/B

4:50pm EDT

Day 1 - Closing
Remarks will be provided on Day 1, and what to expect for the rest of the evening and Day 2.

Speakers
avatar for Jake Kouns

Jake Kouns

Founder, RVAsec
Jake is the founder of RVAsec and was previously the CEO for Risk Based Security that provides vulnerabilities and data breach intelligence. He previously oversaw the operations of the Open Sourced Vulnerability Database (OSVDB.org) and DataLossDB. Kouns has presented at many well-known... Read More →
avatar for Chris Sullo

Chris Sullo

Founder, RVAsec
Chris is the founder of RVAsec and Head of Innovation at Project Discovery, Inc. Chris has been in the security industry for 27 years, working in various research and security roles with Focal Point, HP (SPI Dynamics) and Capital One. He is the author of the “Nikto” web server... Read More →


Tuesday June 4, 2024 4:50pm - 5:00pm EDT

5:00pm EDT

Vendor Break & Room Change
Menu:
  • TBD

Tuesday June 4, 2024 5:00pm - 5:30pm EDT
James River Foyer

5:30pm EDT

RVAsec After Party
We are shaking things up at the end of the first day of RVAsec with our exhilarating Casino Night! This spectacular event begins immediately after the last talk on Tuesday, running from 5:30pm to 9:00pm. Step into a lively atmosphere, reminiscent of Las Vegas, right here in Richmond.

The RVAsec 13 after party, brought to you by RVAsec (still looking for a sponsor to make it even more epic!), will be at in the main Omni Ballroom on Tuesday, June 13th, right after the conference ends!
  • 5:00pm to 9pm: Food/Beverage/Music
  • 5:30ish: Let the games begin!
  • 8:30ish: Games close and we will announce winners!
We’ve curated an array of classic casino games for your enjoyment. Roll the dice at the Craps table, or give our Roulette wheel a spin. If cards are more your speed, try a hand at our Black Jack table, or go all-in with Texas Hold ‘Em Poker. We also offer the exciting Texas Hold ‘Em Bonus Poker Table for a thrilling twist.

But it’s not all dice and cards – test your accuracy with our Golf Shot game, or back a winner with River City Horse Racing. And the best part? There will be food, beverages, music and fabulous prizes for the top players!
So whether you’re a gaming veteran or a novice, this is your chance to relax, have fun, network, and possibly win big! As the day’s talks wrap up, prepare to immerse yourself in an unforgettable evening at the RVAsec after party!

Let the best players win!

This is an exclusive event, so you must be registered to attend or you will not be allowed entrance–no exceptions!
Important Notes:

Menu:
  • TBD


Tuesday June 4, 2024 5:30pm - 9:00pm EDT
Ballroom
 
Wednesday, June 5
 

7:59am EDT

Registration
If you were not able to attend Day 1, please proceed upstairs to register.
If you have any questions or issues please stop by for help.

This is also where you can turn in your Passport for Prizes.

WiFi sponsored by RVAsec: Omni Meeting Password: PASSWORD SOON

Wednesday June 5, 2024 7:59am - 5:00pm EDT
Top of The Grand

8:00am EDT

Breakfast
Come upstairs and enjoy breakfast before the Day 2 welcome session!

Menu:
  • TBD

Wednesday June 5, 2024 8:00am - 8:50am EDT
Top of The Grand

8:50am EDT

Welcome - Day 2
Welcome to Day 2 RVAsec 13!

Remarks will be provided about what to expect at the conference and many thanks to our volunteers and sponsors for making it possible.

Speakers
avatar for Jake Kouns

Jake Kouns

Founder, RVAsec
Jake is the founder of RVAsec and was previously the CEO for Risk Based Security that provides vulnerabilities and data breach intelligence. He previously oversaw the operations of the Open Sourced Vulnerability Database (OSVDB.org) and DataLossDB. Kouns has presented at many well-known... Read More →


Wednesday June 5, 2024 8:50am - 9:00am EDT
Ballroom

9:00am EDT

Keynote
Speakers
avatar for Caleb Sima

Caleb Sima

Chair of CSA AI Security Alliance, Cloud Security Alliance
Caleb serves as the Chair of CSA AI Security Initiative. Caleb served as Chief Security Officer at Robinhood where he focused on keeping customers safe. Prior to Robinhood he was Security CTO at Databricks a leading data analytics and machine learning company where he built the security team from the ground up. Previously he was a Managing... Read More →


Wednesday June 5, 2024 9:00am - 10:00am EDT
Ballroom

10:00am EDT

Vendor Break
Go see our vendors in the Expo!

Menu:
  • TBD

Wednesday June 5, 2024 10:00am - 10:30am EDT
Potomac

10:00am EDT

CTF Competition
Wednesday June 5, 2024 10:00am - 3:00pm EDT
Shenandoah Room

10:00am EDT

HackRVA Badge Training & Repair
Come learn about your badge, get it fixed if there are any issues and talk to HackRVA!

HackRVA is a member-run and organized non-profit makerspace in Richmond, Virginia. HackRVA is a space filled with tools, computers, and people who like to build, invent, tinker, expand their minds, and learn and share new skills. You’ll find a diverse group of individuals who are into electronics, woodworking, embedded software, metalworking, programming, music, art, video, photography, 3D printing, sewing, textiles, and virtual reality—and that’s for starters. HackRVA members have access to the makerspace, tools, community and learning opportunities through member-lead workshops, events and projects.

Wednesday June 5, 2024 10:00am - 4:00pm EDT
Rappahannock

10:00am EDT

Lock Picking Village and Contest
A variety of example locks, from simple to extremely hard, along with a picks of all shapes and sizes will be available in our lock pick village.

Stop by and have some fun testing your skills! Provided hand sanitizer will be required to help reduce the modern risks while we explore the oldest security mechanism on earth!

If you fancy yourself a strong picker or have a competitive streak, we are planning to have a time contest of a series of locks, with the fastest through them all taking home something epic.

Wednesday June 5, 2024 10:00am - 4:00pm EDT
Rappahannock

10:30am EDT

Quickstart To Building Your Own Private AI Chat
Join our quick start guide to building your very own Private AI! In this presentation, we'll explore the key differences between Public and Private AI and the components needed for success. You'll get hands-on experience setting up your development environment, preparing data for training, and using popular libraries to train a simple AI model. We'll also discuss best practices in AI development and provide guidance on evaluating and fine-tuning performance. Don't miss this opportunity to take control of your very own AI and build a system tailored to your unique needs and goals. Join us for an engaging and informative session that will empower you to start building your Private AI today!

Speakers
avatar for Sam Panicker

Sam Panicker

CISO, Networking Technologies + Support
Samuel S. Panicker specializes in cyber security and data protection. He is currently the CISO for NTS with over twenty-six years of experience in the field. Sam has authored several security awareness programs for SANS and Black Hat including “A healthy level of paranoia”.


Wednesday June 5, 2024 10:30am - 11:20am EDT
Ballroom C

10:30am EDT

Apples to Apples
In this speech, we will uncover many of secrets the security services industry doesn't want you to know.  We will follow three real world case examples to show why it's important to know how to compare "apples to apples" when getting the help you need to evaluate, remediate, and mature your security program.

Speakers
avatar for Pyr0 (Luke McOmie)

Pyr0 (Luke McOmie)

Vice President | Offensive Security, Blue Bastion | Ideal Integrations
Mr. McOmie started in offensive security in 1994 and is a trusted advisor, security leader and mentor. With a career focus in offensive security and a strong technical background, he is recognized for his excellence in developing and executing enterprise security strategies and leading... Read More →


Wednesday June 5, 2024 10:30am - 11:20am EDT
Ballroom A/B

10:30am EDT

Patch Perfect: Harmonizing with LLMs to Find Security Vulns
Are LLMs a revolutionary leap forward for security research—or just spicy auto-complete?

The truth lies somewhere in between. This talk cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products. We’ll walk through our process of harnessing large language models (LLMs) for patch-diffing in the context of N-day vulnerability research. Given a vague security advisory and some complicated code diffs, can an LLM get you closer to finding the right spot in the code to dig deeper? Which models work best for this task, and why? Let’s ditch the theory and get our hands dirty with iterative experimentation. Whether you’re a seasoned pentester, applied researcher, or budding practitioner, you'll take away tactical lessons for incorporating AI into your security toolkit.

Speakers
avatar for Caleb Gross

Caleb Gross

Director of Capability Development, Bishop Fox
Caleb Gross is the Director of Capability Development at Bishop Fox, where he leads a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Prior to coming to Bishop Fox, he served as an exploitation operator in the US Department... Read More →


Wednesday June 5, 2024 10:30am - 11:20am EDT
Ballroom D

11:20am EDT

Vendor Break
Go see our vendors in the Expo!

Menu:
  • TBD

Wednesday June 5, 2024 11:20am - 11:30am EDT
Potomac

11:30am EDT

Mindfulness, Meditation, and Cybersecurity
We are meant to enjoy our lives; both personal, and professional. As human beings, and as professionals, we all have to learn how to cultivate even-mindedness, balance, and fortitude to meet life/work challenges. Cybersecurity is fascinating because it requires us to constantly learn, and find ways to optimize our process. Burnout is a huge problem many fields, but especially in Cybersecurity. Cultivating a mindfulness or meditation practice is one of the most efficient ways we can support our process, and manage the stress and anxiety that comes with our professional and personal lives.

The focus of this talk is not specifically on work, because it addresses thoughtful ways to approach every aspect of our lives from our mental and physical health, to our relationships both personally and professionally. Whether new to the industry or a seasoned veteran, this talk with give you some insights, guidance, and the opportunity to practice.

Speakers
avatar for Aqeel Yaseen

Aqeel Yaseen

Associate Security Consultant, Blue Bastion | Ideal Integrations
Aqeel Yaseen transitioned into Offensive Security from over a decade of teaching yoga professionally, and is currently working with Blue Bastion Security. That might seem like a curious combination, but Pentesting and teaching yoga both help people cultivate awareness of blind spots... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Ballroom D

11:30am EDT

Strategic Alliances: How GRC Teams Can Empower Offensive Security Efforts
Collaboration between Governance, Risk, and Compliance (GRC) teams and offensive security teams is vital for a strong security stance. This presentation highlights the role of GRC teams in augmenting offensive security efforts. Traditionally, GRC teams are seen as policy makers, compliance assessors, and risk managers. Their role, however, significantly contributes to offensive security strategies, going beyond these conventional duties. The presentation emphasizes how GRC teams can enhance offensive security through risk-informed strategies, ensuring that offensive measures align with policies and compliance, optimizing resources, and bridging communication between technical and executive teams. The session aims to provide cybersecurity professionals and organizational leaders with a thorough understanding of the importance of GRC teams in offensive security and practical approaches for integrating these functions within their organizations.

Speakers
avatar for Darryl MacLeod

Darryl MacLeod

vCISO, Lares
Darryl MacLeod works for the Lares Advisory Services team and has over 20 years of experience in the IT security sector, having been responsible for developing, managing, and assessing information security programs for all levels of enterprise and government-level organizations. He... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Ballroom C

11:30am EDT

Unlocking Generative AI: Balancing Innovation with Security
Join us for 'Unlocking Generative AI: Balancing Innovation with Security' as we navigate the complex landscape of generative AI in corporate environments. From understanding the fundamentals to exploring security threats like data poisoning and model theft, discover how large enterprises can safeguard sensitive data and AI models. Learn robust mitigation strategies to tackle these challenges head-on, ensuring a secure future for AI innovation. Don't miss this opportunity to delve into the promising yet challenging world of generative AI security.

Speakers
avatar for Jason Ross

Jason Ross

Security Engineer, Salesforce
Jason Ross is a passionate cybersecurity expert with a diverse skill set, currently focused on building tools and processes to test the security of generative AI models & applications that use them. Jason's past work experiences include penetration testing, cloud security, and OSINT.Jason... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Ballroom A/B

12:20pm EDT

Lunch
TBD

Wednesday June 5, 2024 12:20pm - 1:00pm EDT
James River Foyer

1:00pm EDT

Social Engineering the Social Engineers: How To Not Suck at Buying Software
There is a huge gap in security and that gap is understanding the process for acquiring security tools. After buying security tools as an architect and selling as a sales engineer I know the process, pitfalls and gaps in the process. We will dive into the process for both sides. You will learn how you should be architecting your program and winning budget for those tools. We will also explore what happens on the sales side of deal. I will explain what to look out for and what you can take advantage of and the common mistakes we make.

Sales people are top tier social engineers we will explore how to hack them.

Speakers
avatar for David Girvin

David Girvin

Senior solutions engineer, sumo logic
Hacker, BJJ enthusiast, world traveler and surfer. I am a giant weirdo who somehow found my niche in offensive security. I have been blessed getting to build AppSec programs for companies like 1Password and Red Canary. I have an extremely diverse background and hope I can relate and... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
1st Floor, Magnolia Room

1:00pm EDT

The Human Experience of Security Operations
Security Operations has become the talk of the town now that there are CoPilots, Unified Consoles, and VC money pouring into the field.  While many of those things address technical aspects what about the business of security operations?  Specifically the people involved.  Chris Tillett has spent 2 years interviewing SOC leaders and analysts and would like to share his results from this data driven approach.

Speakers
avatar for Chris Tillett

Chris Tillett

Sr. Research Engineer, Palo Alto Networks
Chris currently works for Palo Alto Networks in R&D, helping customers stay ahead of threat actors and helping our products stay customer focused. His experience with UEBA and IAM helped drive the ITDR module to not only focus on Identity based attacks, but also the entire Identity... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
Ballroom C/D

1:00pm EDT

Reverse Engineering for Dummies: The “what if?” user
When developing a product, software engineers often discuss the “what if?” user. What if a user builds their own frontend client? What if a user finds that embedded API key? What if a user notices that endpoint doesn’t have authorization? This talk has three real-life examples from the speaker’s perspective as the “what if?” user. Each example will delve into the motivation, the security flaws reverse engineered, and how to improve the security of each product. This talk will cover reverse engineering assets from an Android game, a waitlist to buy exercise equipment, and a Publish Subscribe system for an auction house. This talk aims to generate interest in identifying software design flaws and reverse engineering them, as well as helping teach about common security issues and practical methods of fixing them.

Speakers
avatar for Micah Parks

Micah Parks

Senior Software Engineer
Micah Parks started his professional career about six years ago in the National Security Agency. After moving to the private sector, Micah has continued to work as a security minded software engineer. He has created and maintains multiple open source projects, with the most popular... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
Ballroom A/B

1:50pm EDT

Vendor Break
Go see our vendors in the Expo!

Menu:
  • Pretzels (regular) served w/ cheese dip & mustard (served warm) Vegetarian
  • Cinnamon Sugar Pretzels (served warm) Vegetarian

Wednesday June 5, 2024 1:50pm - 2:00pm EDT
Potomac

2:00pm EDT

API-ocalypse
Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, takes the stage to present "API-ocalypse" In this thrilling and entertaining session, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos, she will demonstrate jaw-dropping exploits, mind-bending injection attacks, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of API’s to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse.

Speakers
avatar for Jennifer Shannon

Jennifer Shannon

Senior Security Consultant, Secure Ideas
Jennifer Shannon is a Senior Security Consultant at Secure Ideas with a background in malware analysis, penetration testing, and training. An avid computer geek for most of her life, she began her journey in cybersecurity as a SOC Analyst where she showed an aptitude for both penetration... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
1st Floor, Magnolia Room

2:00pm EDT

Scaling Your Creative Output with AI: Lessons from SANS Holiday Hack Challenge
The rise in prominence of AI-powered content generation tools over the past year was tough to miss, and, heck, you have probably already created some cool stuff with them. Putting these tools to work in a meaningful, scalable way, however, can prove challenging.


In this talk, I will equip you with the technical knowledge required to build AI-enhanced tools, we'll discuss strategies for identifying opportunities for said tools, and we'll look at real-world examples from SANS Holiday Hack Challenge, the best darn free, seasonal hacking challenge in the world.

Speakers
EB

Evan Booth

Builder and Architect, Counter Hack
Evan Booth is a builder and architect at Counter Hack, a company devoted to building fun and engaging challenges that educate and evaluate information security professionals. Armed with a profound fascination with how things are built, Evan has spent the past 20 years working on the... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
Ballroom C/D

2:00pm EDT

Building Illusions in the Cloud: Deception Engineering
Deception engineering is a defence-in-depth strategy which many organisations overlook. Post achieving certain level of maturity over their infrastructure security processes, deception engineering is a great security project to enhance monitoring via high fidelity alerts and targeted knowledge of an attack in terms of where the attack's epicentre exists, what actions are the attackers taking, etc.

This session aims to share the overview of what entails when building a deception engineering charter, how to plan for deploying honeypots and honeytokens, and finally how to handle a potential incident that was detected via a honeypot.

Speakers
avatar for Ayush Priya

Ayush Priya

Lead Data & Cloud Security Engineer, CRED
Ayush is a Cyber Security Engineer specialising in Cloud and Data Security, and DevSecOps practices. He loves to develop automation for security controls and processes. He has delivered talks at various conferences and security communities like GrayHat'20, and Cyber Security Global... Read More →
avatar for Saksham Tushar

Saksham Tushar

Head of Security Operations, CRED
Saksham Tushar specializes in various aspects of Threats, including intelligence, detection, analytics, and hunting. He has experience leading teams and collaborating with organizations such as Informatica, Microsoft, and IBM to establish multiple global Security Operations Centers... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
Ballroom A/B

2:50pm EDT

Vendor Break & Room Change
Room change!

Go see our vendors in the Expo!

Menu:
  • TBD

Wednesday June 5, 2024 2:50pm - 3:10pm EDT
Potomac

3:10pm EDT

My Way is Not Very Sportsman-Like: Shaping Adversary Behavior to Strengthen Defenses
We’re taking a fresh look at how to beat cyber attackers at their own games! It’s all about using our defender advantages wisely, controlling, constraining, and shaping the adversary’s moves before the attack even begins. We're ditching the old "Defender’s Dilemma" mindset and showing how smart defense strategies can make a huge difference. Let’s shift our thinking, use our advantages better, and boost our defense without breaking the bank.

Speakers
avatar for David J. Bianco

David J. Bianco

Student, N/A
David is a Staff Security Strategist on Splunk’s SURGe research team. He is also a SANS Certified Instructor, where he teaches network forensics. David has more than 20 years of experience in the information security field, primarily in incident detection and response, threat hunting... Read More →


Wednesday June 5, 2024 3:10pm - 4:00pm EDT
Ballroom

4:00pm EDT

Closing Reception & Awards
The closing will take place right after the final talk.  We will have a short break for attendees to get their beverages & Hors d'oeuvres, and then we will do Prizes and CTF awards.

Menu:
    • Nacho & Soft Taco Bar with Tortilla Chips & Flour Tortillas  Vegetarian
    • Ground Beef
    • Spiced Chicken
    • Black Beans Vegetarian/Vegan/GF
    • Vegetarian Refried Beans Vegetarian/Vegan/GF
    • Guacamole Vegetarian/Vegan/GF
    • Salsa Vegetarian/Vegan/GF
    • Lettuce, Tomato, Cheese & Sour Cream Vegetarian/Vegan/GF
    • Fried Mexican Cheesecake Vegetarian
    • Beer, Wine and Nonalcoholic Beverages - including RVAsec Beer & Cider Option - a non-alcoholic tropical punch (self-service) and sodas 

Speakers
avatar for Chris Sullo

Chris Sullo

Founder, RVAsec
Chris is the founder of RVAsec and Head of Innovation at Project Discovery, Inc. Chris has been in the security industry for 27 years, working in various research and security roles with Focal Point, HP (SPI Dynamics) and Capital One. He is the author of the “Nikto” web server... Read More →


Wednesday June 5, 2024 4:00pm - 5:30pm EDT
Ballroom
 
Filter sessions
Apply filters to sessions.