Agenda for Hack Red Con 2022
Agenda Quick Links
Day 1: September 7
Day 2: September 8
Day 3: September 9
Day 4: September 10
Day 5: September 11
Hotel Floor Plan

Wednesday Sept 7 - Training
10:00 AM - 12:00 PM
12:00 - 1:00 PM
1:00 - 3:00 PM
3:00 - 5:00 PM
Student Session Title: Don't Click that Link! by Cyber.org
Keeneland Room
Free Training
Penetration Testing & Social Engineering - Red Seer Security, Zachary Stashis and Daniel Niefeld
Kentucky Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
Lunch Break
Teacher Session Title: Technical Cybersecurity Curriculum for High School by Cyber.org
Keeneland Room
Free Training
Hardware Auto CAD = How to create a PCB by Ben Hibben
Kentucky Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
Insider Threat Workshop by Colin Glover from CISA
Kentucky Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
Thursday Sept 8 - Training
9:00 AM - 12:00 PM
10:00 AM - 12:00 PM
12:00 - 1:00
PM
1:00 - 3:00 PM
3:00 - 5:00 PM
Industrial Control Systems Cybersecurity - Idaho National Laboratory
Kentucky Room
Free Training
Student Session Title: Don't Click that Link! by Cyber.org
Keeneland Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
Lunch Break
Teacher Session Title: Technical Cybersecurity Curriculum for High School by Cyber.org
Keeneland Room
Free Training
Incident Response by Katrina Khanta
Kentucky Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
CISA tool set, Ransomware Incident Response, Open Questions by Klint Walker from CISA
Kentucky Room
Free Training
Penetration Testing for Systems and Network Admin with Qasim Ijaz and Jake Nelson
Conference Theater
Paid Training
Friday Sept 9 - Conference Day 1
9:00 - 9:45 AM
10:00- 10:45 AM
11:00 - 11:45 AM
12:00 - 12:45 PM
1:00 - 3:00
PM
3:00 - 3:45 PM
4:00 - 4:45 PM
5:00 - 5:45 PM
6:00 - 6:45 PM
7:00 - 8:00 PM
8:00 - 9:00
PM
Morning Kick Off
Main Ballroom A
Keynote Roundtable
Main Ballroom A
War Stories Covert Physical, Wireless, and Red Team Assessments Against Government and
Commercial Clients. - Tim Roberts and Brent White
Main Ballroom A
The Intelligence Value of Russian Data Dumps - Wally Prather
Main Ballroom B
Desktop Support to CISO, the path matters - Jeff Jeracki
Main Ballroom A
A brief overview of the United States Secret Service mission, with an emphasis on cybercrime. Followed by case study examples of digital forensic investigations. - C. Aaron Ghabart
Main Ballroom B
Lunch Break
In Rust I Trust Using Rust with the Offensive Mindset - Charles Shirer
Main Ballroom A
Human-Machine Teaming - AI in Cybersecurity- Michael Leland
Main Ballroom B
Domino effect of supply chain attacks by Klint Walker
Main Ballroom A
How to Rob a Bank Over the Phone - Joshua Crumbaugh
Main Ballroom B
Spilling the Beans: How to Spot a Bad Pentest - Qasim Ijaz & Andrew Clinton
Main Ballroom A
Bighuge BLS OSINT Tool - Techromancer
Main Ballroom B
AWS IAM Privilege Escalation Redux - int eighty (of Dual Core)
Main Ballroom A
Using Molecular Communication Systems to Activate In Vivo Bio-nanorobotic Devices - Gregory Carpenter (Virtual)
Main Ballroom B
Bourbon Break at Hyatt Bar
Main Ballroom A
Hacker Jeopardy
Main Ballroom A
Saturday Sept 10 - Conference Day 2
9:00 - 9:45 AM
10:00 - 10:45 AM
11:00 - 11:45 AM
12:00 - 12:45 AM
1:00 - 3:00 PM
3:00 - 3:45 PM
4:00 - 4:45 PM
5:00 - 5:45 PM
6:00 - 6:45 PM
7:00 - 8:00 PM
8:00 - 9:00 PM
9:00 - 12:00 AM
Keynote Roundtable
Main Ballroom A
Penetration Testing in the Airforce: How the Service Hacks to Move Faster - Tyler Fordham
Main Ballroom A
Hidden Threat of Social Media - Social Engineering & OSINT - Stacy M. Arruda (Virtual)
Main Ballroom B
Bootstrapping your AppSec program - David Girvin
Main Ballroom A
From exploiting my smart-home into controlling thousands of smart-devices around the world - Barak Sternberg ( Virtual from Tel Aviv, Isreal)
Main Ballroom B
Incident Response Table Top Walk Through - Klint Walker
Main Ballroom A
Surefire Symbiosis: Data, Security, and Privacy with the NIST Frameworks. Implementing Cyber Security and Privacy. - Kelli Tarala
Main Ballroom B
Lunch Break
Insider Threat Awareness - Colin Glover
Main Ballroom A
Digital Forensics & Incident Response (DFIR) - Mobile Forensics - Katrina Khanta
Main Ballroom B
Red Teaming, Pen Testing, Research - Joe Brinkley
Main Ballroom A
Improv Comedy as a Social Engineering Tool - Dave Mattingly
Main Ballroom B
Greenfielding a cyber security program for billion-dollar healthcare company- Alex Kot
Main Ballroom A
Offense sells tickets: Lessons learned from training the next generation of Pentesters - Tennisha Martin (Virtual)
Main Ballroom B
How I get COVID in a RedTeam SE and Physical Intrusion - Daniel Isler (Virtual)
Main Ballroom B
Award Ceremony, Raffles
Main Ballroom B
Slide Shenanigans
Main Ballroom B
Party with Mastashake and Dual Core
Main Ballroom A
Sunday Sept 11 - Day 5
-
10:00 AM - 12:00 PM Hacker Breakfast - Open to whoever wants to join