cyberwarcon.com
Come say hi and meet other attendees tonight and skip the long lines tomorrow morning!
Thanks to our sponsor Google Cloud!
www.cyberwarcon.com
Come say hi and meet other attendees tonight and skip the long lines tomorrow morning!
Thanks to our sponsor Google Cloud!
www.cyberwarcon.com
Their support helps fuel the conversations, connections, and collaboration that make this community strong.
Chew. Chat. Chill.
Their support helps fuel the conversations, connections, and collaboration that make this community strong.
Chew. Chat. Chill.
Eat. Drink. Be Merry.
Thank you to Qintel for supporting this important part of the conference experience.
Eat. Drink. Be Merry.
Thank you to Qintel for supporting this important part of the conference experience.
Eat. Sip. Conquer.
Thank you to Team Cymru for contributing to a productive conference experience.
Eat. Sip. Conquer.
Thank you to Team Cymru for contributing to a productive conference experience.
His talk, "Poisoning Fast and Slow: LLM Compromise as a Vector for Influence Operations", will explore LLM data-poisoning as a vector for influence operations and when these attacks matter.
Learn more about his work:
www.cyberwarcon.com
His talk, "Poisoning Fast and Slow: LLM Compromise as a Vector for Influence Operations", will explore LLM data-poisoning as a vector for influence operations and when these attacks matter.
Learn more about his work:
www.cyberwarcon.com
(no sales pitches, please, and I'll promise the same)
(no sales pitches, please, and I'll promise the same)
Can't make it in-person? Virtual tickets are just $75 and include livestream access + mailed swag right to your door for US attendees! Grab your ticket today!
cyberwarcon.com
Can't make it in-person? Virtual tickets are just $75 and include livestream access + mailed swag right to your door for US attendees! Grab your ticket today!
cyberwarcon.com
Check out our website to view the agenda and plan your day, read more about our speakers, or buy a last minute ticket!
We can't wait to see everyone in Arlington, VA on November 19th!
www.cyberwarcon.com
Check out our website to view the agenda and plan your day, read more about our speakers, or buy a last minute ticket!
We can't wait to see everyone in Arlington, VA on November 19th!
www.cyberwarcon.com
His talk with Alex Orleans, is titled "'Oil into the Fire:' An Inside Look at SVR Cyberespionage".
www.cyberwarcon.com
His talk with Alex Orleans, is titled "'Oil into the Fire:' An Inside Look at SVR Cyberespionage".
www.cyberwarcon.com
Ivan Kwiatkowski is a security researcher and a malware analyst working on account investigations.
His talk, "When State Actors Go Mobile: APT29’s Use of Commodity Malware" details APT29.
cyberwarcon.com
Ivan Kwiatkowski is a security researcher and a malware analyst working on account investigations.
His talk, "When State Actors Go Mobile: APT29’s Use of Commodity Malware" details APT29.
cyberwarcon.com
Join us for early check in sponsored by Google Cloud!
Happening Tuesday, November 18 from 5:30–7:30 PM at the Hyatt Regency Crystal City in the Independence Center!
Join us for early check in sponsored by Google Cloud!
Happening Tuesday, November 18 from 5:30–7:30 PM at the Hyatt Regency Crystal City in the Independence Center!
Join us for early check in sponsored by Google Cloud!
Happening Tuesday, November 18 from 5:30–7:30 PM at the Hyatt Regency Crystal City in the Independence Center!
Join us for early check in sponsored by Google Cloud!
Happening Tuesday, November 18 from 5:30–7:30 PM at the Hyatt Regency Crystal City in the Independence Center!
His talk w/ Sara McBroom covers a group that has been exploiting a 7 y.o Cisco Smart Install vulnerability to compromise network devices across telecomms., education, + manufacturing sectors.
His talk w/ Sara McBroom covers a group that has been exploiting a 7 y.o Cisco Smart Install vulnerability to compromise network devices across telecomms., education, + manufacturing sectors.
Patrick has expertise in monitoring and defending against cyber espionage threat actors.
His talk, "Cyber(trade)war: Paradigm Shift in Economic Espionage", will cover the shift in PRC state-sponsored cyber espionage.
Learn more! www.cyberwarcon.com
Patrick has expertise in monitoring and defending against cyber espionage threat actors.
His talk, "Cyber(trade)war: Paradigm Shift in Economic Espionage", will cover the shift in PRC state-sponsored cyber espionage.
Learn more! www.cyberwarcon.com
Patrick has expertise in monitoring and defending against cyber espionage threat actors.
His talk, "Cyber(trade)war: Paradigm Shift in Economic Espionage", will cover the shift in PRC state-sponsored cyber espionage.
Learn more! www.cyberwarcon.com
Her talk with Dina Sadek, "Cheap Tricks, High-Impact: How AI Is Powering Sloppy Influence Campaigns", unpacks how AI is reshaping the influence operation supply chain.
Check out more:
www.cyberwarcon.com
Her talk with Dina Sadek, "Cheap Tricks, High-Impact: How AI Is Powering Sloppy Influence Campaigns", unpacks how AI is reshaping the influence operation supply chain.
Check out more:
www.cyberwarcon.com
Her talk with Margot Fulde-Hardy, "Cheap Tricks, High-Impact: How AI Is Powering Sloppy Influence Campaigns", highlights AI-powered influence campaigns.
Grab your ticket before we sell out!
www.cyberwarcon.com
Her talk with Margot Fulde-Hardy, "Cheap Tricks, High-Impact: How AI Is Powering Sloppy Influence Campaigns", highlights AI-powered influence campaigns.
Grab your ticket before we sell out!
www.cyberwarcon.com
His talk, "Poisoned Waters: Dive into APT24’s Multi-Pronged BADAUDIO Espionage Campaign", offers a look into a sophisticated, multi-pronged espionage campaign by APT24, a China-nexus threat actor, primarily targeting a wide range of sectors in Taiwan.
His talk, "Poisoned Waters: Dive into APT24’s Multi-Pronged BADAUDIO Espionage Campaign", offers a look into a sophisticated, multi-pronged espionage campaign by APT24, a China-nexus threat actor, primarily targeting a wide range of sectors in Taiwan.
His talk highlights commercial spyware actors' cleanup of forensic artifacts which prevents meaningful analysis of mobile device infections.
www.cyberwarcon.com
His talk highlights commercial spyware actors' cleanup of forensic artifacts which prevents meaningful analysis of mobile device infections.
www.cyberwarcon.com
www.cyberwarcon.com
www.cyberwarcon.com
He has fifteen+ years of experience in threat intelligence, and has built a career at the intersection of cybersecurity and geopolitics.
He will be joining David Magnotti for their talk "Ping First, Boom Second", which will focus on Iranian cyber threat groups.
He has fifteen+ years of experience in threat intelligence, and has built a career at the intersection of cybersecurity and geopolitics.
He will be joining David Magnotti for their talk "Ping First, Boom Second", which will focus on Iranian cyber threat groups.
He leads development of cyber threat intel. systems helping protect AWS customers from malware + more. He will be joining Dlshad Othman in their talk, "Ping First, Boom Second", to discuss Iranian cyber-threats Imperial Kitten and Muddy Water.
www.cyberwarcon.com
He leads development of cyber threat intel. systems helping protect AWS customers from malware + more. He will be joining Dlshad Othman in their talk, "Ping First, Boom Second", to discuss Iranian cyber-threats Imperial Kitten and Muddy Water.
www.cyberwarcon.com
His work played a central role in the landmark indictment of North Korean hacker Rim Jong Hyok. He has received the FBI Medal of Excellence and the Department of Justice Attorney General Award for Distinguished Service.
His work played a central role in the landmark indictment of North Korean hacker Rim Jong Hyok. He has received the FBI Medal of Excellence and the Department of Justice Attorney General Award for Distinguished Service.