Saturday, November 8, 2025

Track 1 - Aud 1 Track 2 - Aud 0 Track 3 - Aud 2 Atrium Scroll Bar

9:00 am

Atrium
9:00 am → 60 min

Registration

10:00 am

Track 1 - Aud 1
10:00 am → 50 min

Defending Against the Chimaera: Understanding the Design Principles of Threat Actor Tradecraft

  • Intermediate (200)
  • Technical
  • English (preferred)
  • Recording
Track 2 - Aud 0
10:00 am → 50 min

Navigating Chaos: A Prison's Struggle with Ransomware and Legacy Systems

  • Intermediate (200)
  • Other
  • English (preferred)
  • Recording
Track 3 - Aud 2
10:00 am → 50 min

Catch Me If You Can: How Attackers Outsmart EDR tools

  • Intermediate (200)
  • Technical
  • English (preferred)
  • Recording

10:50 am

Atrium
10:50 am → 15 min

Break

11:05 am

Track 1 - Aud 1
11:05 am → 45 min

They said I could be anything, so I became a botnet: Catching an APT while hunting for cybercrime

  • Advanced (300)
  • Technical
  • English (preferred)
  • No recording
Track 2 - Aud 0
11:05 am → 45 min

Practical threat modeling for any occasion

  • Introductory and Overview (100)
  • Other
  • English (preferred)
  • Recording
Track 3 - Aud 2
11:05 am → 45 min

GRC isn't a dirty word

  • Introductory and Overview (100)
  • Strategic
  • English (preferred)
  • Recording

11:50 am

Atrium
11:50 am → 25 min

Break

12:15 pm

Track 1 - Aud 1
12:15 pm → 45 min

Red Team Safari - Close Encounters with Bears, Pandas and Kittens

  • Advanced (300)
  • Technical
  • English (preferred)
  • Recording
Track 2 - Aud 0
12:15 pm → 45 min

Compromising Threat Actor Communications

  • Advanced (300)
  • Research
  • English (preferred)
  • Recording
Track 3 - Aud 2
12:15 pm → 45 min

We Applied the MS/CIS/STIG Security Baseline - Are We Safe Now? (Spoiler: No, You’re Not)

  • Advanced (300)
  • Technical
  • English (preferred)
  • Recording

1:00 pm

Atrium
1:00 pm → 60 min

Lunch

2:00 pm

Track 1 - Aud 1
2:00 pm → 45 min

From CVR to security.txt: An overview of Danish companies stance on vulnerability disclosure

  • Intermediate (200)
  • Research
  • English (preferred)
  • Recording
Track 2 - Aud 0
2:00 pm → 45 min

Social Engineering for Covert Access Assignments

  • Intermediate (200)
  • Social Engineering
  • English (preferred)
  • Recording
Track 3 - Aud 2
2:00 pm → 45 min

Anti-patterns in Security Monitoring

  • Intermediate (200)
  • Awareness
  • English (preferred)
  • Recording

2:45 pm

Atrium
2:45 pm → 15 min

Break

3:00 pm

Track 1 - Aud 1
3:00 pm → 45 min

Good times.. fun times ..WTF times..

  • Intermediate (200)
  • Industrial Control Systems
  • English (preferred)
  • Recording
Track 2 - Aud 0
3:00 pm → 45 min

Behind Closed Doors: Physical Red Team Tactics

  • Introductory and Overview (100)
  • Social Engineering
  • English (preferred)
  • No recording
Track 3 - Aud 2
3:00 pm → 45 min

Hardware Hacking Curiosity

  • Intermediate (200)
  • Other
  • English (preferred)
  • Recording

3:45 pm

Atrium
3:45 pm → 30 min

Break & Cake

4:15 pm

Track 1 - Aud 1
4:15 pm → 65 min

Hidden Dragon: A Thriving Chinese Fraud Ecosystem

  • Intermediate (200)
  • Research
  • English (preferred)
  • No recording
Track 2 - Aud 0
4:15 pm → 65 min

I got 99 problems but a decryptor ain't one: how to save $1.5 million on ransom via manual recovery

  • Expert (400)
  • Research
  • English (preferred)
  • No recording
Track 3 - Aud 2
4:15 pm → 45 min

No Backdoor Needed: How a Modern OT Edge Device Left Itself Exposed

  • Introductory and Overview (100)
  • Industrial Control Systems
  • English (preferred)
  • Recording

5:00 pm

Scroll Bar
5:00 pm - 7:55 pm

BSides Bar & Networking

Session and Speaker Management powered by Sessionize.com