THREATCON1
AGENDA
September 21st
LUNCH
Golf and capture the flag kickoff
DINNER, DRInks & NEtworking
September 22ND
BREAKFAST
Carahsoft, 5 East (5E)
WELCOME & OPENING REMARKS
Carahsoft, 5 East (5E)

KEYNOTE SPEAKERS
Carahsoft, 5 East (5E)


SPONSOR Hall
DEMO ZONE
Carahsoft, 5 East (5E)
Visit and chat about sponsor’s cyber solutions at their corresponding tables.
Disclosing the Disclosures
Carahsoft, 5 West (5W)


Writing Exploits When No One Else Has
Carahsoft, 5 East (5E)

A Conduit for Subtle Threats in the Enterprise Landscape
Carahsoft, 5 East (5E)

Equivalent Exchange: The True Cost of Innovation in Cybersecurity

Hours, Not Days: The Race from Disclosure to In-the-Wild Exploitation
Carahsoft, 5 West (5W)



Using Binary Analysis to Quantify Potential Zero-Day Risk in Software
Carahsoft, 5 East (5E)

Inside CL0P’s MOVEit Campaign: Zero Days, Data Theft, and an Industry-Wide Response
Carahsoft, 5 East (5E)


The Dependency Mirage: Hidden Vulnerabilities in Your Compiled Binaries
Carahsoft, 5 West (5W)

Flexible Endpoint Security with Osquery
Carahsoft, 5 East (5E)

Prioritizing the 1%: How to Focus on the Vulnerabilities That Actually Get Exploited
Carahsoft, 5 West (5W)

LUNCH BREAK
Carahsoft, 5 East (5E)
From Tradecraft to Threat Intelligence: Applying Intelligence Community Principles to AI-Driven Cyber Defense
Carahsoft, 5 West (5W)

I Don’t Like Your Proof-of-Concept
Carahsoft, 5 East (5E)

A View Into A Hacker’s Windows
Carahsoft, 5 West (5W)

Fragile by Design: Large-Scale Evidence of Supply Chain Risk
Carahsoft, 5 East (5E)

Beyond Silos: Eliminating Blind Spots Where Adversaries Thrive
Carahsoft, 5 West (5W)

The CAUSALITY Project: Achieving Intrusion Prediction
Carahsoft, 5 East (5E)

How to Triage & Research Vulnerability Data With Community Tools
Carahsoft, 5 East (5E)


Reducing the Insider Risk Cone of Uncertainty
Carahsoft, 5 West (5W)

Tools of the Trade: Infrastructure Behind DPRK IT Workers
Carahsoft, 5 West (5W)

Beyond CVEs: Uncovering the Hidden Threat of End‑of‑Life Software
Carahsoft, 5 West (5W)

Inside Ransomware: Facts and Findings from the Blackbasta and Lockbit Leaks
Carahsoft, 5 East (5E)

We Can’t Wait for Patch Tuesdays: The Case for AI Blue Teaming
Carahsoft, 5 West (5W)

Cache Me If You Can: Modern iOS Spyware and the Vanishing Forensic Trai
Carahsoft, 5 East (5E)

Securing the Map: Emerging Threats and Defenses in Geolocation Infrastructure
Carahsoft, 5 West (5W)

Uncovering Hidden Attack Paths with Vector Databases
Carahsoft, 5 East (5E)

Are the Bad Guys Already in Your Software Supply Chain? (Spoiler Alert: Yes)
Carahsoft, 5 East (5E)

Tolerance for Ambiguity: Beyond the Playbook
Carahsoft, 5 West (5W)

Cocktail Reception
Carahsoft, 5 East (5E)