This event has ended. Visit the
official site
or
create your own event on Sched
.
Texas Cyber Summit II
-
Saved To
My Schedule
WELCOME TO THE TEXAS CYBER SUMMIT
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Map
Search
or browse by date + venue
Advanced
All
Forensics
Hacking
Packet Captures
Python
Red Team
Briefing
All
Blue Team
Business
Hunting
Pen Testing
Red Team
Car Hacking
All
Exploits
Career Fair
All
Resume Review
Challenge
All
Hacking
Scada
Competition
All
Adults
Blue Team
Hacking
Hunting
Compliance
All
CISO
Containers
All
Hacking
Hands-On
All
Blue Team
Forensics
GHIDRA
Hacking
Malware Analysis
Packet Captures
Webapps
Workshop
Incident Response
All
Hunting
Intermediate
All
Analysis
Blue Team
CISO
Exploits
Forensics
Hacking
Hacking DirectTV
IDENTITY MANAGEMENT
Intrusion Detection
IoT
IoT Emedded Devices
Mobile
Packet Captures
Privacy
Red Team
Supply Chain
Webapps
Introduction
All
Blue Team
Career
Cloud Computing
Domain Name Services
GHIDRA
Hunting
PenTesting
Privacy
Red Team
Scada
Webapps
Keynote
All
Artificial Intelligence
Hacking
LUNCH ON YOUR OWN
Monitoring
All
Intrusion Detection
Sales Solutions Brief
All
Marketing
Social
All
Adults
Social Engineering
All
Hacking
Training
All
PenTesting
Company
BI.ZONE
BitDefender
CarbonBlack
Critical Start
CSA
DEVO
FireEye
Forge Point Capital
Fortinet
FSI.IO
McAfee
Microsoft
Mitre
NotSoSecure
Oracle
Palo Alto Networks
ReconInfoSec
RedTeam Nation
SpecterOps
SphereNY
Tanium
TrustedSec
UpGuard
USAA
Audience
Advanced
Beginner
Career Search
CISO
Keynote
Memory Agent
midlevel
Subject
AppSec
Architecture
blue team
Botnet
Business
CIS
DevOps
DevSecOps
Digital Transformation
Embedded
Exploits
Hacking
Hunting
incident response
IoT
MacOS
Malware
Model View Controller
OWASP
Packets
red team
Reverse Engineering
SIEM
Threat Intelligence
Area
Deep Walk-Through
Focused Talk
Hands-on
moloch
Monitoring
Product/Services
Reverse Engineering
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Map
Search
Download our free app:
Popular Events
#1
Keynote - Dave Kennedy
#2
Opening Ceremony
#3
TH-2025 Hunting: How to start, go down a rabbit hole, and get out without relying on your tools
#4
Lunch On your Own - Thursday
#5
MR-1011 Crawl, Monitor, Walk, Detect
#6
RT-2002 The Carder's Opsec: A Practical Approach to Anti-forensics
#7
TX-1001 From Zero to Hero - Dropout to Engineer
#8
900 - Hacker Trivia "BSides SATX"
#9
BN-1012 The Pentester Blueprint: A Guide to Becoming a Pentester
#10
FR-2016 Red Team BackdorOS, in-Memory
#11
RE-1012 Ghidra for the begineer reverse enginering
#12
HX-3014 Owning the Cloud through SSRF – Service-Side Request Forgery
#13
IR-1005 CSA IoT Security Controls Framework
#14
PT-1012 The Pentester Blueprint: A Guide to Becoming a Pentester
#15
SE-1001 I PWN Thee, I PWN Thee Not - Social Engineering
#16
BT-2020 20/20 Enterprise Security Monitoring: Seeing Clearly with Security Onion
#17
DO-2012 DevSecOps with emphasis on Container Security
#18
DF-2011 How to build an effective malware protection architecture for file uploads in modern web apps
#19
Keynote - Dr. Chenxi Wang
#20
Social - Cy'Beer & Social Mixer
#21
Friday Opening and Welcome
#22
Lunch On your Own - Friday
#23
CF-2003 Finding and Decoding Malicious PowerShell Scripts
#24
NA-1024 Network Traffic Analysis with Moloch
#25
BT-1050 Shining a Light on Shadow IT in the Cloud
#26
RE-1080 Intro to Reverse Engineering with Ghidra: Taming the Dragon
#27
DO-3030 Anatomy of cloud hacking
#28
RT-1053 Predictive Analytics using Aggregated Threat Intelligence
#29
TH-3005 Host & Threat Hunting on a Budget
#30
WA-1005 - Intro to Web App Pentesting
#31
RT-2007 Red Team Tactics for Pentesters
#32
NA-2066 Exploiting Information Leaks for Amazing Network Discovery
#33
BN-1001 Introduction to Information Security
#34
BT-2021 OWASP API Security Top 10
#35
CO-1115 Cybersecurity in Today's Cyber Threat Environment.
#36
BN-1014 - The Pentester Blueprint: A Guide to Becoming a Pentester
#37
WS2014 - Malware Traffic Analysis Workshop 1
#38
ET-1212 Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
#39
CS-2013 DNS over HTTPS
#40
Keynote - Shannon "Snubs" Morse
#41
Closing Ceremony
#42
SH-1011 - The Hacker Hippocampus: Meet your brain on games
#43
BT-3082 Learning to Rank Strings Output for Speedier Malware Analysis
#44
PR-3021 Bypassing Python 3.8 Audit Hooks
#45
CW-1018 Insider Threats: Stories from outside the cubicle
#46
The ABC’s of CTF’s
#47
TH-1015 Finding the Rogue Node
#48
WA1015 - Web App Pentesting for Bug Hunters
#49
WG-1001 Cyber Wargames CTF
#50
RT-2021 Today’s red team isn’t enough
Popular by Type
All Types
Advanced
Briefing
Car Hacking
Career Fair
Challenge
Competition
Compliance
Containers
Hands-On
Incident Response
Intermediate
Introduction
Keynote
LUNCH ON YOUR OWN
Monitoring
Sales Solutions Brief
Social
Social Engineering
Training
Popular by Day
All days
Thursday, Oct 10
Friday, Oct 11
Saturday, Oct 12
Recently Active Attendees
Chris Woehl
David Marsh
Arturo de los Santos
Phillip Wylie
Luis Cacho
Jeff Reich
AS
Aaron Schoenrock
DZ
Dustin Zahradnik
More →