Texas Cyber Summit MMXXII Sept. 22, 2022 to Sept. 24, 2022, Austin, TX

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome & Kickoff: Joseph Mlodzianowski Joseph Mlodzianowski Opening of the 5th Annual “Texas Cyber Summit” Introduction of the Austin Mayor – Steve ...
Welcome: Mayor Adler Mayor Steve Adler Steve Adler is Austin’s 52nd Mayor, He will be welcoming attendees and speaking about what ...
Keynote David Kennedy NA
Special Guest Bailey Bickley NA
IAM, Benefits of Holistic Identity Charles Burton A focus on identity management will reduce cybersecurity risk and improve overall technology effectiveness and ...
API Security Through External Attack Surface Management Phillip Wylie It is hard to protect what you cannot see. So many times organizations are not ...
Damn the Exploits! Full Speed Ahead v1.1 Christopher Cottrell Damn the Exploits! Full Speed Ahead v1.1 – How naval fleet tactics redefine cyber operations
OT Risks to Our Modern Connected Society David Brearley Integrating Operational Technology (OT) mitigations into design of the built environment to protect our connected ...
Panel Discussion: National Cybersecurity Matthew Mlodzianowski “We Must Hang Together or We Shall All Hang Separately” A Discussion on the Nation’s ...
Attack Vectors: Your helpdesk Technology may be the weakest link Fernando “nando” Tomlinson Many organizations are employing technology to help lessen the burden on helpdesk personnel. In some ...
Mini-Tabletop Exercises to Validate a DFIR Program Nader Sakraney Good Things Come in Small Packages: Mini-Tabletop Exercises to Validate a DFIR Program
Kubernetes (IN)Security Lenin Alevski Huerta Kubernetes has become the operating system of the Internet, more and more organizations prefer to ...
Panel: Startups, Early Stage and the Law Robert W. Brown , Serrin Turner , Thom Taylor PANEL DISCUSSION: Cyber Resilience; Start-ups, funding and the Law
Nation-State Attacks: unnoticed Geoffrey Coulehan Nation-State Attacks: unnoticed Abstract: The largest municipalities, government organizations, and enterprises in the United States ...
5 Ways Security Leaders Are Using Cyber Ranges Debbie Gordon 5 Ways Security Leaders Are Using Cyber Ranges and Simulation to Improve their Security Posture ...
Incident Response Plans in 2022 Elizabeth Nevarez Hackers and internet criminal gangs continue to outsmart the best defenses in the cybersecurity solutions ...
Breaking through the clouds: building a comprehensive security strategic vision employing technology and tools. Jason Robbins The reality today is that security leaders and practitioners are challenged to articulate and understand ...
A Metaverse of Insecurity Ira Winkler A Metaverse of Insecurity: The vulnerabilities in creating, implementing, managing, and living in a metaverse.
Only the most cyber-resilient organizations William Macmillan Only the most cyber-resilient organizations are capable of navigating the challenges brought by the current ...
Accessibility at scale using AI/ML and Serverless Jack Leguisamon Accessibility at scale using AI/ML and Serverless During this session, Jack Marchetti and Selenis Leguisamon, ...
Classic Car Hacking Oscar Anaya Classic Car Hacking Cars of the 80’s , 90’s and early 2000’s have been forgotten ...
Zero Trust – A Focus on Identity (Identity, Credential, and Access management and the CDM Program) Ross Foard Zero Trust – A Focus on Identity (Identity, Credential, and Access management and the CDM ...
Zscaler: Zero Trust at the Tactical Edge Conrad Maiorino For tactical communicators, the ability to securely connect to the internet from literally anywhere can ...
The Supply Chain is Compromised, A National Security Risk Col. Marc Jamison COVID taught everyone that we do live in a global economy. We rely on others ...
SOAR is a Sore Subject: How to Effectively Plan and Deliver on Your Automation Initiatives Erin Montero The advent of Security Orchestration & Automation in 2015 heralded a new age of security ...
The Uncomfortable Truth About Apple Security Joshua Long Apple’s ostensible policy about Mac operating system updates is that security issues get patched for ...
Fool’s Gold: The Hidden Costs of “Cracked” software Jonathan Gonzalez Environments run an assorted amount of different software programs. From Microsoft Word to the CandyCrush ...
I See ICS Attacks Robert L. Grubbs I See ICS Attacks…And Now You Do Too. Re the Audience, being honest it is ...
Zscaler: Security Gamechangers for Federal Agencies – Zero Trust and TIC 3.0 Anup Barde Zscaler: Security Gamechangers for Federal Agencies – Zero Trust and TIC 3.0 Dive into TIC ...
Leadership: Bridging the Executive Communication Gap Ashley M. Rose Bridging the Executive Communication Gap Bridging the Executive Communication Gap: The Security Leader’s Communication Playbook ...
Mortars and Malware: Russian Hackers at War Nataliia Zdrok Since the Russian invasion of Ukraine in February, events have been changing dramatically in cyberspace. ...
Web3 and the Metaverse are Here…What Now? Theodore Oakley Web3 and the Metaverse are Here…What Now? ======= Cybersecurity has advanced since the 1970’s first ...
Trusting Managed Security Service (MSS) Ryan René Rosado How to Trust a Managed Security Service (MSS) to Increase Your Resiliency and How Outsourcing ...
Emerging Software Supply Chain Tony Loehr Google SLSA & NIST SSDF: Emerging Software Supply Chain Security Best Practices The severity and ...
You’re Not Broken…Just Different: Don’t Let UnDiagnosed Neurodivergence Ruin Your Life Chris Culling You’re Not Broken…Just Different: Don’t Let Undiagnosed Neurodivergence Ruin Your Life Have you ever felt ...
Enabling siloed security tools to provide deep insights Chris Jordan Deep Insights Business today has become a complex data problem that requires comprehensive time-sensitive insights. ...
Becoming Secure by Design Tim Brown Becoming Secure by Design in the Face of Evolving Cyber Threats As the cyber threat ...
Guerilla Warfare for the Blue team Rob Carson Guerilla Warfare for the Blue team Blue Team Security is the hardest job in Information ...
Our Cyberpunk Future is Here (Just Not Evenly Distributed) Beau Woods Our Cyberpunk Future is Here (Just Not Evenly Distributed) Description: We are at the dawn ...
Call to Arms: Utilizing our veterans to end cyber risk Ron Cole Call to Arms: Utilizing our veterans to end cyber risk How veterans can leverage their ...
Texas Cyber Speak Easy Joseph Mlodzianowski Badge Required – Wrist Band Required Join us for an hour or so – of ...
Welcome Day 2: Timothy Amerson Timothy Amerson NA
Keynote: Brigadier General Paul Craft Brig. Craft NA
Special Guest Day 2: Chris Wysopal, “Zero Trust for Software” Chris Wysopal For too long we have implicitly trusted software that we purchase, or download, both commercial ...
COMpromising COMputers Evan Oliveau COMpromising COMputers COMpromising COMputers will cover how red teams and malicious threat actors abuse Microsoft ...
CatPhish Automation Justin Hutchens CatPhish Automation – The Emerging Use of Artificial Intelligence in Social Engineering Infestations of bots ...
Threat Detection: Upside down makes it right-side-up Jacqueline Hines Sometimes looking at something upside down makes it right-side-up: Threat Detections An effective threat detection ...
Defensive Controls Analysis Andrew Hay Performing a Defensive Controls Analysis This session will show you how to create a detailed ...
Roads Less Traveled to Cybersecurity Cecilia Marinier Roads Less Traveled to Cybersecurity According to recent report issued by (ICS)2 workforce study, cybersecurity’s ...
Intro al “Red Team”: Preparándote para tu primera infiltración David Probinsky Intro al “Red Team”: Preparándote para tu primera infiltración A todos nos encanta el Red ...
Detecting the Undetectable: Linux Rootkits Jace Walker Detecting the Undetectable: Linux Rootkits 2022 has seen a handful of new or resurfaced Linux ...
Revealing unexpected system32 processes lineage (with queries!) Chris Kulakowski Core windows system processes have a fairly predictable process lineage. Therefore deviation from this expected ...
Panel: Education, Resources, training and talent shortages affecting the Cybersecurity industry Joseph Mlodzianowski , Kemba Eneas Walden , Cecilia Amerson Talent shortages affecting the Cybersecurity industry, Education, Resources, training Opportunities for Developing Cyber Talent, in ...
1 + 1 = 3 Driving value through integrated cybersecurity operations Joe Mcmann Title: 1 + 1 = 3. Driving value through integrated cybersecurity operations. Abstract: EDR, MDR, ...
The Art of Hacking – How does an exploiter really think? Jordan Bonagura Demonstrate that intruders or exploiters really don’t care about rules created by companies when the ...
Building a Successful Internal Red Team Rob "mubix" Fuller Building a Successful Internal Red Team Red Teaming has a large number of definitions in ...
National ID’s History and Future Sherif Hazzaa National ID’s History and Future The terrorist attacks of September 11have revived proposals for a ...
10 Truths of Infosec Bryson Bort 10 Truths of Infosec The stages of breaking into cybersecurity to growing through your career ...
Turn Alert Fatigue into Action with Knowledge Graphs for Cybersecurity Jasmine Henry Turn Alert Fatigue into Action with Knowledge Graphs for Cybersecurity Cloud security is noisy – ...
Get to know your network using Graph Theory Caroline Caldwell Get to know your network using Graph Theory A network of computers with thousands of ...
Shifting Your Mindset to Open New Opportunities and Ultimately Hacking the Cybersecurity Career Path Annabelle Klosterman A New Perspective, Utilizing Your Skill Sets and Opening New Opportunities Empowering technology students and ...
Managing Life as a Neurodivergent Chuck Weissenborn There’s no such thing as a “Hack” for Mental Health: Managing LIfe as a Neurodivergent ...
Threat Modeling for Developers and Security Ell Marquez As 70% of all vulnerabilities are on the application level, there is no question that ...
How and Why Hackers Hack Roger A. Grimes How and Why Hackers Hack and How To Defend Yourself and Your Organization Roger will ...
The Complexity of Cyber Teams Threat hunting Joey Jablonski The Complexity of Cyber Teams Threat hunting The intersection of several truths including increasing data ...
Diving into the underground market of Stealer Logs Apurv Singh Gautam Diving into the underground market of Stealer Logs Threat actors are always looking for the ...
DevOps: Assess & Accelerate Mark Peters Assess & Accelerate: A phenomenological look at DevOps value in functional & security decisions Original ...
Decision-Making in Real-World Security Triage Situations Matthew Ranganath Risk and Business Decision-Making in Real-World Security Triage Situations: A Choose-Your-Own-Adventure Pop quiz hotshot – ...
The Big Disruption in Cybersecurity Jenny Tucker The Big Disruption in Cybersecurity: Why Security Awareness Training isn’t Moving the Needle Security awareness ...
Incident response IR and recovery Jan Marek What to do and not do in case of security incident, data breach or critical ...
Art of Mastering the successful Mergers Reet Kaur NA
ICS Ransomware and Conti W. Garrett Myler ICS Ransomware and Conti A recent report highlights the threat ransomware poses to critical infrastructure, ...
Challenges in securing cloud-native workloads Gabriel M Schuyler Challenges in securing cloud-native workloads You’ve finished your (rushed by lockdown) lift-and-shift to the cloud, ...
Ransomware: Best Practices Ernesto Ballesteros Ransomware: Best Practices, before you become a victim A overview of pre and post-incident best ...
Accelerating Incident Response Gerard Johansen Rapid containment and isolation tactics to minimize damage and get back up and running. Accelerating ...
A Chaotic cause for Detection Engineering Dayspring Johnson The days of traditional “set it and forget it” controls for security are over. Historical ...
Cameras, CACs & Clocks: Enterprise IoT Security Sucks John Vecchi Cameras, CACs & Clocks: Enterprise IoT Security Sucks – A Story of Two Million Interrogated ...
Welcome Day 3: Red Thomas Red Thomas NA
Keynote: Ed Mornston Ed Mornston NA
Special Guest Day 3: Daniel Clayton Daniel Clayton Please join Special Guest Daniel Clayton as he discuss managed services
So you’re in the cloud? What’s next? Mathew J. Lamb So you’re in the cloud? What’s next? – how to avoid common security mistakes early ...
macOS Privilege Escalation Kyle Avery macOS Privilege Escalation Given the relative immaturity of commercial endpoint security products for macOS, users ...
Locking Down Your MySQL Dave Stokes Locking Down Your MySQL Database Server Locking Down Your MySQL Database Server or How to ...
DevSecOps – Detecting Suspicious GitHub Behavior Jose Hernandez DevSecOps – Detecting Suspicious GitHub Behavior
MFA – Golden attack vector for attackers Parth Shukla An in-depth discussion on how attackers can abuse the MFA/2FA functionality in a different way. ...
API Security Through External Attack Surface Management (sat) Phillip Wylie API Security Through External Attack Surface Management It is hard to protect what you cannot ...
Hillbilly Story time (2022 Edition) – Pentest Fails Adam Len Compton NA
Exploiting Advanced Volatile Memory Solomon Sonya Exploiting Advanced Volatile Memory Analysis Challenges for Fun and Profit
Cocinando con Recetas CyberChef Marco Palacios CyberChef es conocida como ” La navaja suiza cibernética ” y es una aplicación web ...
Using Azure Resource Graph for Good and for Evil Darwin Salazar “Azure Resource Graph (ARG) is a little known service that you interact with daily if ...
Utilizing the Cyber Defense Matrix David Mendoza Jr. Utilizing the Cyber Defense Matrix framework to evaluate your security posture “How secure is your ...
Bring back passwords Mike Schwartz Bring back the password–but do it right this time. Current orthodoxy elevates passwordless authentication to ...
Hacking the Global Financial System (For Fun and Profit) Bryan Mcaninch Hacking the Global Financial System (For Fun and Profit) With the emergence of a globalized ...
Security automation – tools and use cases Peter Luo Security automation – tools and use cases Security teams are constantly burnt out due to ...
Hacking OT Software Michael Heinzl Hacking OT Software – A case study of breaking a wide selection of products As ...
Building and Maintaining a Modern SaaS Program Darryl Macleod From The Trenches: Building and Maintaining a Modern SaaS Information Security Program For many SaaS-based ...
Target Acquired Christopher Russell NA
Building effective attack surface manage programs Phillip Wylie NA
Pass me the TTP’s James Boyd Title: Can Someone Pass Me The TTPs? One years worth of Threat Hunting findings and ...
When Security Tools fail you Michael Gough When Security Tools fail you, what can you do to close this gap? We all ...
Video Elminiated the Radio Star Jayson E. Street Like the song “Video Killed the Radio Star” We no longer sit around the radio ...
Shields up! the Russians are here Santiago Holley Shields up, the Russians are here. In this talk, we will go over the most ...
More cuckoo about malware Karl Rasmussen More cuckoo about malware More cuckoo about malware Living in a containerized world… Python, Golang, ...
Incident Response – Are you prepared? Christina Barker Incident Response – Are you prepared? When it comes to incident response everyone knows that ...
Zscaler: Deception Conrad Cruchaga The Modern Day HoneyPots Deception gives the SOC Teams insight of Perimeter Recon and early ...
Building Better Penetration Testing Kevin Johnson Seeing Further: Building Better Penetration Testing After years of working as a “red teamer”, Kevin ...
Intro to OT Cybersecurity Danielle Jablanski Intro to OT Cybersecurity: How Everything Became Cyber and Cyber Became Everything
The Relationship of Higher Education and Law Enforcement Performance Christian Nanry The relationship between higher education and law enforcement performance is still under debate. Since the ...
Red Team: The Art of Phishing Serge Borso Session Description: Red Teamers and Pen Testers – Have you ever devised the perfect phishing ...
Closing Keynote: Casey Ellis Casey Ellis NA
Closing Ceremony Timothy Amerson , Joseph Thomas NA