Sched.com Conference Mobile Apps
Texas Cyber Summit
has ended
Create Your Own Event
Texas Cyber Summit
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Attendees
Tickets
Search
or browse by date + venue
BLUE TEAM
All
DEFENSE
Incident Response
BREAKING CYBER
All
ARCHITECTURE
Policy
CRITICAL INFRASTRUCTURE
All
ARCHITECTURE
DEFENSE
SCADA
SPECIAL GUEST
CYBER 101
All
Social Engineering
TOOLS & TACTICS
KEYNOTE
All
OPENING REMARKS
SPECIAL GUEST
Movie
RECRUITING
RED TEAM
All
MALWARE
TOOLS & TACTICS
Sabotage
All
Hands-On
Popular
menu
Menu
Schedule
Speakers
Sponsors
Attendees
Tickets
Search
Download our free app:
Popular Events
#1
Friday 1pm Special Guest
#2
Friday Morning Keynote
#3
Friday Keynote - The Future of Cyber Red Teams
#4
Opening Remarks
#5
I'm Pwned. You're Pwned. We're All Pwned
#6
Panel: Smart City Challenges and Opportunities
#7
Real-life incident response: Attacks Against Security Devices
#8
The Offensive Defender | Cyberspace Trapping
#9
A Proper Introduction to Metasploit
#10
Seven Steps to Effectively Defend Industrial Control Systems
#11
One Social Profile to Rule Them All – Social Media Exploitation
#12
Social Engineering, dont fall for it.
#13
Cybersecurity for Automation Systems Challenges, Reality and Solutions
#14
ICS201 Introduction to Threat Hunting on an ICS Network
#15
Wiping The Slate Clean: The Ongoing Evolution of Wiper
#16
What's Lurking in your Source Code
#17
KEYNOTE 2
#18
Saturday Keynote
#19
Anatomy of Cyber Attacks
#20
Hunting in Memory: Live Memory Analysis at Scale
#21
Keeping Up With The APTs
#22
Who Controls the Controllers - Hacking Crestron IoT Automation Systems
#23
Social Cy'Beer Mixer
#24
METASPLOIT MODULE AND EXPLOIT DEVELOPMENT
#25
ATT&CKing the Enterprise
#26
Cyber Threat Response (CTR) Clinic
#27
Joe, Mary, John and Valarie - Your largest Threats
#28
Real-life incident response: An Evolution of Attacks Against Infrastructure and Security Devices
#29
Turning Cyber Toddlers into Warriors
#30
G'Suite Email Compromise & Recovery
#31
Cyber Threat Response (CTR) Clinic
#32
Hacking the Elections
#33
Practical Attacks on the Modern Web
#34
Threat Hunting on ICS Networks
#35
Common Vulnerabilities in Medical Devices
#36
Closing Ceremony - Awards
#37
Sunday Keynote
#38
Hunting and gathering your credentials
#39
Evasions -Who needs Zero days ?
#40
Containers: What you need to know - now
#41
Rise of the Red Team Machines
#42
Quality Root Cause Analysis for Security Breaches
#43
Everything of Nothing: A True Cybercrime Story
#44
Feed Me SIEM More! Datasource of Horrors
#45
Hacking the Middle East
#46
Threat Hunting on ICS Networks
#47
Exploring API Usage for Credential Abuse and Automated Attacks
#48
IOT Home device under attack. Or how to scare a cat over udp.
#49
Perched Upon a ROCK
#50
Pacu: Attack and Post-Exploitation in AWS?
Popular by Type
All Types
BLUE TEAM
BREAKING CYBER
CRITICAL INFRASTRUCTURE
CYBER 101
KEYNOTE
Movie
RECRUITING
RED TEAM
Sabotage
Popular by Day
All days
Friday, Oct 12
Saturday, Oct 13
Sunday, Oct 14
Recently Active Attendees
Florin Alexandru Badita Nistor
Joseph Zadeh
Bijo Mathew
Phillip Wylie
R
RusPu
Patrick Landry
Lee Carsten
LM
Lacey Moss
More →