Sched.com Conference Mobile Apps
Texas Cyber Summit
has ended
Create Your Own Event
Texas Cyber Summit
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Attendees
Tickets
Search
or browse by date + venue
BLUE TEAM
All
DEFENSE
Incident Response
BREAKING CYBER
All
ARCHITECTURE
Policy
CRITICAL INFRASTRUCTURE
All
ARCHITECTURE
DEFENSE
SCADA
SPECIAL GUEST
CYBER 101
All
Social Engineering
TOOLS & TACTICS
KEYNOTE
All
OPENING REMARKS
SPECIAL GUEST
Movie
RECRUITING
RED TEAM
All
MALWARE
TOOLS & TACTICS
Sabotage
All
Hands-On
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Sponsors
Attendees
Tickets
Search
Download our free app:
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Map
Friday
, October 12
Floor 1 Lone Star 1
10:00am •
Sabotage Challenge I
LIMITED
3:00pm •
Sabotage II
LIMITED
Floor 3 Executive Salon 2
11:00am •
Wiping The Slate Clean: The Ongoing Evolution of Wiper
LIMITED
2:00pm •
A Proper Introduction to Metasploit
FULL
Floor 3 Executive Salon 3
11:00am •
Carrying the SecURITy Shield – U R IT!
LIMITED
2:00pm •
Recent APT Campaign targeting Energy Sector Assets
LIMITED
3:00pm •
Social Engineering, dont fall for it.
LIMITED
4:00pm •
One Social Profile to Rule Them All – Social Media Exploitation
LIMITED
Floor 3 Executive Salon 4
11:00am •
I'm Pwned. You're Pwned. We're All Pwned
FILLING
2:00pm •
Real-life incident response: Attacks Against Security Devices
FILLING
3:00pm •
The Offensive Defender | Cyberspace Trapping
LIMITED
4:00pm •
What's Lurking in your Source Code
LIMITED
Floor 3 Executive Salon 5
11:00am •
Challenges of Enterprise Segmentation
LIMITED
2:00pm •
Building Products People Trust
LIMITED
3:00pm •
Regulatory requirements for risk assessments
LIMITED
Floor 3 San Antonio Ballroom
11:00am •
Cybersecurity for Automation Systems Challenges, Reality and Solutions
LIMITED
2:00pm •
ICS201 Introduction to Threat Hunting on an ICS Network
LIMITED
4:00pm •
Seven Steps to Effectively Defend Industrial Control Systems
LIMITED
7:00pm •
Movie: 300
LIMITED
Texas Ball Room, Floor 2
9:00am •
Opening Remarks
9:30am •
Friday Morning Keynote
11:00am •
10 Things every job seeker should know
12:00pm •
Friday Keynote - The Future of Cyber Red Teams
LIMITED
1:00pm •
Friday 1pm Special Guest
FILLING
2:00pm •
Community Based Career Development
LIMITED
3:00pm •
Don’t Panic, and Carry a Towel for Your Career
LIMITED
4:00pm •
Transitioning Careers? Upskilling in cybersecurity when you need it most
LIMITED
5:30pm •
Panel: Smart City Challenges and Opportunities
Saturday
, October 13
Floor 1 Lone Star 1
9:00am •
Sabotage Challenge III
LIMITED
2:00pm •
Sabotage IV
LIMITED
Floor 3 Executive Salon 2
10:00am •
ATT&CKing the Enterprise
LIMITED
11:00am •
Keeping Up With The APTs
LIMITED
2:00pm •
METASPLOIT MODULE AND EXPLOIT DEVELOPMENT
FULL
5:00pm •
Who Controls the Controllers - Hacking Crestron IoT Automation Systems
LIMITED
Floor 3 Executive Salon 3
10:00am •
Joe, Mary, John and Valarie - Your largest Threats
LIMITED
11:00am •
Dynamic VM Tool Chain Utilizing Unikernels
LIMITED
2:00pm •
Anatomy of Cyber Attacks
LIMITED
3:00pm •
Cyber Threat Analysis & Attribution – A Complicated Team Sport
LIMITED
4:00pm •
Cyber Hunting Through the Attacker Lifecyle
LIMITED
5:00pm •
Getting started in InfoSec – Advice and Tips
LIMITED
Floor 3 Executive Salon 4
10:00am •
Cyber Threat Response (CTR) Clinic
LIMITED
11:00am •
Real-life incident response: An Evolution of Attacks Against Infrastructure and Security Devices
LIMITED
2:00pm •
Ridealong Adventures - Critical Issues with Police Body Cameras
LIMITED
3:00pm •
Hunting in Memory: Live Memory Analysis at Scale
LIMITED
4:00pm •
G'Suite Email Compromise & Recovery
LIMITED
Floor 3 Executive Salon 5
10:00am •
Target-Based Security Model
LIMITED
11:00am •
Hacking the Elections
LIMITED
2:00pm •
Why its time to take a chainsaw to AI
LIMITED
3:00pm •
Practical Attacks on the Modern Web
LIMITED
4:00pm •
Turning Cyber Toddlers into Warriors
LIMITED
5:00pm •
Cuckoo Possibilities
LIMITED
Floor 3 San Antonio Ballroom
10:00am •
Threat Hunting on ICS Networks
LIMITED
2:00pm •
Preventing Radiological Sabotgge at US Nuclear Power Plants
LIMITED
3:00pm •
Securing and mitigating OT Maritime cyber environments
LIMITED
4:00pm •
Consequence Driven Threat Hunting
LIMITED
5:00pm •
Common Vulnerabilities in Medical Devices
LIMITED
5:00pm •
Common Vulnerabilities in Medical Devices
LIMITED
Texas Ball Room, Floor 2
8:45am •
Saturday Opening
LIMITED
9:00am •
Saturday Keynote
11:00am •
Cyber Intel Jobs are not the same
LIMITED
1:00pm •
KEYNOTE 2
LIMITED
2:00pm •
Finding the Right Tools and Codes for Your Career Search
LIMITED
5:00pm •
Cyber Threat Response (CTR) Clinic
LIMITED
6:00pm •
Social Cy'Beer Mixer
LIMITED
Sunday
, October 14
Floor 3 Executive Salon 2
9:30am •
Pacu: Attack and Post-Exploitation in AWS?
LIMITED
10:30am •
Evasions -Who needs Zero days ?
LIMITED
11:30am •
Musings of a Former TAO Developer
LIMITED
12:30pm •
OT vs. IT: Why the differences matter
LIMITED
Floor 3 Executive Salon 3
9:30am •
Everything of Nothing: A True Cybercrime Story
LIMITED
11:30am •
Containers: What you need to know - now
LIMITED
12:30pm •
Rise of the Red Team Machines
LIMITED
Floor 3 Executive Salon 4
9:30am •
Hunting and gathering your credentials
LIMITED
10:30am •
Enhancing SOC by using feedback loops
LIMITED
11:30am •
Feed Me SIEM More! Datasource of Horrors
LIMITED
12:30pm •
Perched Upon a ROCK
LIMITED
Floor 3 Executive Salon 5
9:30am •
Responding & Recovering from a Business Email Compromise
LIMITED
10:30am •
Quality Root Cause Analysis for Security Breaches
LIMITED
11:30am •
Exploring API Usage for Credential Abuse and Automated Attacks
LIMITED
12:30pm •
Investigation's Should Change Our Mind Set
LIMITED
Floor 3 San Antonio Ballroom
9:30am •
IOT Home device under attack. Or how to scare a cat over udp.
LIMITED
10:30am •
Threat Hunting on ICS Networks
LIMITED
12:30pm •
Hacking the Middle East
LIMITED
Texas Ball Room, Floor 2
9:00am •
Sunday Keynote
LIMITED
1:30pm •
Closing Ceremony - Awards
LIMITED
Timezone
Texas Cyber Summit
America/Chicago
Filter By Date
Texas Cyber Summit
Oct 12
-
14, 2018
Friday
, October 12
Saturday
, October 13
Sunday
, October 14
Filter By Venue
111 East Pecan Street, San Antonio, TX, USA
Sort schedule by Venue
Floor 1 Lone Star 1
Floor 3 Executive Salon 2
Floor 3 Executive Salon 3
Floor 3 Executive Salon 4
Floor 3 Executive Salon 5
Floor 3 San Antonio Ballroom
Texas Ball Room, Floor 2
Filter By Type
BLUE TEAM
All
DEFENSE
Incident Response
BREAKING CYBER
All
ARCHITECTURE
Policy
CRITICAL INFRASTRUCTURE
All
ARCHITECTURE
DEFENSE
SCADA
SPECIAL GUEST
CYBER 101
All
Social Engineering
TOOLS & TACTICS
KEYNOTE
All
OPENING REMARKS
SPECIAL GUEST
Movie
RECRUITING
RED TEAM
All
MALWARE
TOOLS & TACTICS
Sabotage
All
Hands-On
Popular
Recently Active Attendees
Florin Alexandru Badita Nistor
Joseph Zadeh
Bijo Mathew
Phillip Wylie
R
RusPu
Patrick Landry
Lee Carsten
LM
Lacey Moss
More →
Filter sessions
Apply filters to sessions.
close
Dates
Friday
, October 12
Saturday
, October 13
Sunday
, October 14
Venue
Floor 1 Lone Star 1
Floor 3 Executive Salon 2
Floor 3 Executive Salon 3
Floor 3 Executive Salon 4
Floor 3 Executive Salon 5
Floor 3 San Antonio Ballroom
Texas Ball Room, Floor 2
Session Type
BLUE TEAM
All
DEFENSE
Incident Response
BREAKING CYBER
All
ARCHITECTURE
Policy
CRITICAL INFRASTRUCTURE
All
ARCHITECTURE
DEFENSE
SCADA
SPECIAL GUEST
CYBER 101
All
Social Engineering
TOOLS & TACTICS
KEYNOTE
All
OPENING REMARKS
SPECIAL GUEST
Movie
RECRUITING
RED TEAM
All
MALWARE
TOOLS & TACTICS
Sabotage
All
Hands-On
Other Filters
Popular