View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.
Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.
John Sawyer (Director of Services, Red Team, IOActive, Inc.)
Date: Monday, May 20
Time: 9:00am - 12:00pm
Pass type: All Access, Summits & Workshops - Get your pass now!
Vault Recording: TBD
This morning workshop will focus on practical network and system hardening tips to make attackers work much harder as they try to move laterally, escalate privileges, and exfiltrate data. Our goal is to show where visibility needs to be built into our networks and endpoints by understanding how real attackers break into modern networks. Labs will center around Windows and Linux tools that have a variety of offensive and defensive applications to demonstrate common attack paths.
Attendees who want to participate in the hands-on exercises will need a laptop with virtualization software (i.e. VirtualBox or VMware Fusion/Workstation). Windows 10 and Kali Linux virtual machines should be configured prior to class. They can be downloaded from the following locations: