Menu Close

Agenda (Scroll down for room assignments)


Distinguished Congresswoman Maxine Waters


Specialty Events

Electronic Arts
Free Radicals
.. and more!

Visit some of our vendors and learn what they have to offer!

Compete in teams of 2-3 to see who is the ultimate hacker! Enjoy this Capture The Flag Hackathon with elements of Question/Answer and possibly even an entire pentesting image!

Prizes for 1st, 2nd, and 3rd place, as well as for runners-up in each category. Must be present at Closing Ceremony to win.

Sponsored by Electronic Arts

Play your favorite games for fun and prizes!

Grab your lunch from the buffet room, and take it into the main ballroom. Mix and mingle with the speakers and industry professionals at the conference!

*Separate room for VIPs, Volunteers, and Sponsors to pick up their meals.
**Students will be prioritized in the main Buffet Room
***Food available while supplies last

Luncheon sponsored by Adobe

Click this link for more information

*All attendees are invited to audit the summit.
**Please be courteous of quiet entrance/ext, as the summit does not follow the regular break schedule of the conference.


Farzan Karimi

With an increased focus on sophisticated attacks within the cybersecurity community, it is often the simplest bug that goes unnoticed and creates the biggest impact. Farzan Karimi, the Senior Manager for EA’s Red Team, will demo some recent web attacks to highlight how a red team proactively identifies high risk issues.

Ashley Wilson

Complexity is the enemy of security. We’ll take a look at cases where complexity, friction, and ¯\_(ツ)_/¯ have led to unnecessary attack surface, and finish up with a brief look at some newer perspectives on authentication and identity for IoT devices.

Garrett Whelan

A lot of people want a career in cyber security but they don't know where to start.  One of the fastest growing pathways is Capture The Flag competitions.  Students can learn skills, solve fun puzzles, work with their friends, and demonstrate their abilities to employers all at the same time.  Professor Garrett Whelan will take you through the different kinds of competitions, from root2boot to Open Source Intelligence, the jobs that they lead to, and how you can get started today.

Patricia Benoit
Ed Covert
George Llano
George Nam
Ken Selfridge

A panel of senior Security executives from leading companies, including Warner Bros, Deluxe Entertainment Services Group, and Novacoast will share their career paths, experiences and advice on the breadth of security careers. They’ll discuss skills that will help you get noticed for an internship or entry-level position. Plus, they’ll allow plenty of time for Q&A.


Bill Creasey

During this session we will share stories and real world scenarios from penetration tests performed against mid-sized banks across the United States. Beyond phishing for a user we will be discussing in person physical security testing and reconnaissance. Join us to explore techniques, define concepts, and build frameworks for performing a penetration tests as well as discuss possible defenses and mitigations against such attacks.

Carolyn Lear

"Building security in" is an important fundamental approach for any software product or system, and involves continual active engagement with development and engineering teams. Attendees will walk away with knowledge of a high-level and basic approach for an SDL (Secure Development Lifecycle) program and Threat Modeling, which can be modified depending on tools available and maturity of security in an organization.

Abigail Deras

Changing careers can be overwhelming. However, there are ways to transition successfully starting with identifying your skillsets and establishing a goal for success. In the talk, “From Archaeo to Archivexe,” Abigail will reflect on her nearly decade of experience as a woman in cybersecurity, her transition from a non-traditional field to cybersecurity, and useful tips for personal and professional development.



Learn the basics of reverse engineering and binary exploitation! We'll discuss basic concepts of reverse engineering, disassembly, decompilation, tools used, and some examples to get started.

Abigail Deras
Melanie Hildebrandt
Luza Jaramillo
Lee Ann Kline
Carolyn Lear

This panel will focus on what it is like to be a woman in a male-dominated industry, as well as offer insights on how to get more women involved in STEM, and where to find helpful resources. In addition, panelists will share their personal journeys, experiences, and challenges. Questions and discussion are encouraged.

*This Panel is scheduled until 2:45pm. Quiet entrance and exit is not discouraged, if necessary.

Alex Speaks

Kubernetes is a container scheduler, but there are so many obscure concepts in just that phrase that diving in to Kubernetes can be daunting. I will give attendees a head start into the world of Kubernetes. I will cover the core concepts, recommend when to use it and when to avoid it, and explain how we got into this containerized mess in the first place.

Mina Martinez

E-Technology awareness; Interpersonal skills in the marketplace are more important than ever since so many social skills are lacking with the abundant use of electronic devices

In today's media infused world, our face to face interactions has become even more crucial to our success. Address how Business, Dining and Social Etiquette can be utilized in the real world. Behaving in public and private environments are explored. Netiquette and cyber awareness – Participants will feel an increased sense of self-esteem, greater confidence in social and professional situations with ease that will open doors and encourage opportunities.

is containerized mess in the first place.

Tristan Henning

The Lockpicking Exhibition is a physical security demonstration and participation area. Participants can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Participants are free to come and go at will.


Kevin Haley

This talk will examine today's most profitable cybercrime, it's origins, why it's so easy to do and where it evolves next.  It will also teach you how to sell someone the Brooklyn Bridge and why this 100 year old scam provides a lesson in preventing future cybercrime.

Peleus Uhley

Within large organizations, data will be distributed across multiple systems that were never designed to be cross-referenced. Micro-service applications have increased the complexity of how all of your systems interact. Nevertheless, security teams must find ways to correlate information from across their entire enterprise in order to test and analyze systems at scale. This presentation will discuss how to design and build tools that can survive in an ever-changing landscape. One technique that will be demonstrated will be the use of graphs. Graphs have been used across the security space for spam and fraud detection, network defense, and even red teaming. This presentation will discuss how Adobe has built graph-based tools to improve application security testing and analysis in a complex enterprise environment.

Jeff Boleman

The aim of this session is to provide a practical reference to inform Information Technology (IT) students and professionals of best practices for developing and growing a “cloud-enabled” next generation IT workforce. The need for businesses to transform their development and operational capabilities for increased agility and efficiency is approaching an all-time high, which in turn drives increased demand for cloud-knowledgeable solution IT architects, operations staff and DevSecOps teams to apply cloud services and related technologies to these challenges.

Learn how to give your resume the edge it needs to make it past the recruiters and catch your desired employer's attention!

Internet-connected printers available on the first floor!

Tristan Henning

The Lockpicking Exhibition is a physical security demonstration and participation area. Participants can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Participants are free to come and go at will.


No Content


Awards for Hackkathon and ESports


Exit Survey

... and more!