Agenda for Hack Red Con 2022

Wednesday Sept 7 - Training

10:00 AM - 12:00 PM

12:00 - 1:00 PM

1:00 - 3:00 PM

3:00 - 5:00 PM

Student Session Title: Don't Click that Link! by Cyber.org

Keeneland Room
Free Training

Penetration Testing & Social Engineering - Red Seer Security, Zachary Stashis and Daniel Niefeld

Kentucky Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

Lunch Break

Teacher Session Title: Technical Cybersecurity Curriculum for High School by Cyber.org

Keeneland Room

Free Training

 

Hardware Auto CAD = How to create a PCB by Ben Hibben

Kentucky Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

Insider Threat Workshop by Colin Glover from CISA 

Kentucky Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

 

Thursday Sept 8 - Training

9:00 AM - 12:00 PM

10:00 AM - 12:00 PM

12:00 - 1:00
PM

1:00 - 3:00 PM

3:00 - 5:00 PM

Industrial Control Systems Cybersecurity - Idaho National Laboratory

Kentucky Room

Free Training

Student Session Title: Don't Click that Link! by Cyber.org

Keeneland Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

Lunch Break

Teacher Session Title: Technical Cybersecurity Curriculum for High School by Cyber.org

Keeneland Room

Free Training

Incident Response by Katrina Khanta

Kentucky Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

CISA tool set, Ransomware Incident Response, Open Questions by Klint Walker from CISA 

Kentucky Room

Free Training

Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson

Conference Theater

Paid Training

 

Friday Sept 9 - Conference Day 1

9:00 - 9:45 AM

10:00- 10:45 AM

​11:00 - 11:45 AM

12:00 - 12:45 PM

1:00 - 3:00

PM

3:00 - 3:45 PM

4:00 - 4:45 PM

5:00 - 5:45 PM

6:00 - 6:45 PM

7:00 - 8:00 PM

8:00 - 9:00
PM

Morning Kick Off

Main Ballroom A

Keynote Roundtable

Main Ballroom A

War Stories Covert Physical, Wireless, and Red Team Assessments Against Government and

Commercial Clients. - Tim Roberts and Brent White

Main Ballroom A

The Intelligence Value of Russian Data Dumps - Wally Prather

Main Ballroom B

 

Desktop Support to CISO, the path matters - Jeff Jeracki

Main Ballroom A

A brief overview of the United States Secret Service mission, with an emphasis on cybercrime. Followed by case study examples of digital forensic investigations. - C. Aaron Ghabart

Main Ballroom B

Lunch Break

In Rust I Trust Using Rust with the Offensive Mindset - Charles Shirer

Main Ballroom A

Human-Machine Teaming - AI in Cybersecurity- Michael Leland

Main Ballroom B

 

Domino effect of supply chain attacks  by Klint Walker

Main Ballroom A

How to Rob a Bank Over the Phone - Joshua Crumbaugh

Main Ballroom B

 

Spilling the Beans: How to Spot a Bad Pentest - Qasim Ijaz & Andrew Clinton

Main Ballroom A

Bighuge BLS OSINT Tool - Techromancer

Main Ballroom B

 

AWS IAM Privilege Escalation Redux - int eighty (of Dual Core)

Main Ballroom A

Using Molecular Communication Systems to Activate In Vivo Bio-nanorobotic Devices - Gregory Carpenter (Virtual)

Main Ballroom B

 

Bourbon Break at Hyatt Bar

Main Ballroom A

 
Hacker Jeopardy

Main Ballroom A

 

Saturday Sept 10 - Conference Day 2

9:00 - 9:45 AM

10:00 - 10:45 AM

11:00 - 11:45 AM

12:00 - 12:45 AM

1:00 - 3:00 PM

3:00 - 3:45 PM

4:00 - 4:45 PM

5:00 - 5:45 PM

6:00 - 6:45 PM

7:00 - 8:00 PM

8:00 - 9:00 PM

9:00 - 12:00 AM

Keynote Roundtable

Main Ballroom A

Penetration Testing in the Airforce: How the Service Hacks to Move Faster - Tyler Fordham

Main Ballroom A

Hidden Threat of Social Media - Social Engineering & OSINT - Stacy M. Arruda (Virtual)

Main Ballroom B

 

Bootstrapping your AppSec program - David Girvin

Main Ballroom A

From exploiting my smart-home into controlling thousands of smart-devices around the world - Barak Sternberg ( Virtual from Tel Aviv, Isreal)

Main Ballroom B

Incident Response Table Top Walk Through - Klint Walker

Main Ballroom A

Surefire Symbiosis: Data, Security, and Privacy with the NIST Frameworks. Implementing Cyber Security and Privacy. - Kelli Tarala

Main Ballroom B

Lunch Break

 

Insider Threat Awareness - Colin Glover

Main Ballroom A

Digital Forensics & Incident Response (DFIR) - Mobile Forensics - Katrina Khanta

Main Ballroom B

 

Red Teaming, Pen Testing, Research - Joe Brinkley

Main Ballroom A

Improv Comedy as a Social Engineering Tool - Dave Mattingly

Main Ballroom B

 

Greenfielding a cyber security program for billion-dollar healthcare company- Alex Kot

Main Ballroom A

Offense sells tickets: Lessons learned from training the next generation of Pentesters - Tennisha Martin (Virtual)

Main Ballroom B

 

How I get COVID in a RedTeam SE and Physical Intrusion - Daniel Isler (Virtual)

Main Ballroom B

 
Award Ceremony, Raffles

Main Ballroom B

 
Slide Shenanigans

Main Ballroom B

Party with Mastashake and Dual Core

Main Ballroom A

 

   Sunday Sept 11 - Day 5

  • 10:00 AM - 12:00 PM Hacker Breakfast - Open to whoever wants to join