This event has ended. Visit the
official site
or
create your own event on Sched
.
Texas Cyber Summit II
-
Saved To
My Schedule
WELCOME TO THE TEXAS CYBER SUMMIT
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Map
Search
or browse by date + venue
Advanced
All
Forensics
Hacking
Packet Captures
Python
Red Team
Briefing
All
Blue Team
Business
Hunting
Pen Testing
Red Team
Car Hacking
All
Exploits
Career Fair
All
Resume Review
Challenge
All
Hacking
Scada
Competition
All
Adults
Blue Team
Hacking
Hunting
Compliance
All
CISO
Containers
All
Hacking
Hands-On
All
Blue Team
Forensics
GHIDRA
Hacking
Malware Analysis
Packet Captures
Webapps
Workshop
Incident Response
All
Hunting
Intermediate
All
Analysis
Blue Team
CISO
Exploits
Forensics
Hacking
Hacking DirectTV
IDENTITY MANAGEMENT
Intrusion Detection
IoT
IoT Emedded Devices
Mobile
Packet Captures
Privacy
Red Team
Supply Chain
Webapps
Introduction
All
Blue Team
Career
Cloud Computing
Domain Name Services
GHIDRA
Hunting
PenTesting
Privacy
Red Team
Scada
Webapps
Keynote
All
Artificial Intelligence
Hacking
LUNCH ON YOUR OWN
Monitoring
All
Intrusion Detection
Sales Solutions Brief
All
Marketing
Social
All
Adults
Social Engineering
All
Hacking
Training
All
PenTesting
Company
BI.ZONE
BitDefender
CarbonBlack
Critical Start
CSA
DEVO
FireEye
Forge Point Capital
Fortinet
FSI.IO
McAfee
Microsoft
Mitre
NotSoSecure
Oracle
Palo Alto Networks
ReconInfoSec
RedTeam Nation
SpecterOps
SphereNY
Tanium
TrustedSec
UpGuard
USAA
Audience
Advanced
Beginner
Career Search
CISO
Keynote
Memory Agent
midlevel
Subject
AppSec
Architecture
blue team
Botnet
Business
CIS
DevOps
DevSecOps
Digital Transformation
Embedded
Exploits
Hacking
Hunting
incident response
IoT
MacOS
Malware
Model View Controller
OWASP
Packets
red team
Reverse Engineering
SIEM
Threat Intelligence
Area
Deep Walk-Through
Focused Talk
Hands-on
moloch
Monitoring
Product/Services
Reverse Engineering
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Map
Search
Download our free app:
tune
Filter sessions
Type:
Introduction
[
clear filter
]
Thursday
, October 10
9:15am CDT
Opening Ceremony
TEXAS BALLROOM - A/B | Keynote - CISO
Deidre Diamond
11:15am CDT
TH-2025 Hunting: How to start, go down a rabbit hole, and get out without relying on your tools
TEXAS BALLROOM - F Track 2
Dr Chelsea Hicks
3:30pm CDT
MR-1011 Crawl, Monitor, Walk, Detect
TEXAS BALLROOM - C Track 1
O'Shea Bowens
5:00pm CDT
TX-1001 From Zero to Hero - Dropout to Engineer
BONHAM 3-B | Bee'ing New
Allie Barnes
Friday
, October 11
11:00am CDT
98 - Overcoming Workforce Retention and Recruitment Challenges
BONHAM 3-X Common Area Stage *End of Hall
Kathleen Smith
BN-1014 - The Pentester Blueprint: A Guide to Becoming a Pentester
TEXAS BALLROOM - C Track 1
Phillip Wylie
11:15am CDT
BN-1001 Introduction to Information Security
BONHAM 3-B | Bee'ing New
Lee 'MadHat' Heath
DHS-1000 The Mission of the Cybersecurity and Infrastructure Security Agency
BONHAM 3-C | Expert 1
George Reeves
1:00pm CDT
RE-1080 Intro to Reverse Engineering with Ghidra: Taming the Dragon
BONHAM 3-E | Expert 3
Christopher Doege
2:15pm CDT
BT-1050 Shining a Light on Shadow IT in the Cloud
TEXAS BALLROOM - C Track 1
Jessica Hazelrigg • Marisa Dyer
3:15pm CDT
CO-1115 Cybersecurity in Today's Cyber Threat Environment.
BONHAM 3-E | Expert 3
Aaron Drake
4:00pm CDT
CS-2013 DNS over HTTPS
TEXAS BALLROOM - A/B | Keynote - CISO
Dr. Paul Vixie
TM-2002 Threat Modelling : Creating a feedback Model in agile environment
TEXAS BALLROOM - C Track 1
WA-1005 - Intro to Web App Pentesting
BONHAM 3-B | Bee'ing New
Phillip Wylie
5:15pm CDT
RT-1053 Predictive Analytics using Aggregated Threat Intelligence
TEXAS BALLROOM - C Track 1
David Evenden
Saturday
, October 12
11:15am CDT
BT-2034 Keeping Threat Intelligence in Pace with Continuous Monitoring
TEXAS BALLROOM - C Track 1
Michael Rodriguez
CW-1018 Insider Threats: Stories from outside the cubicle
BONHAM 3-D | Expert 2
David Balcar
ICS-2010 Holistic ICS Cybersecurity Assessments
TEXAS BALLROOM - E Track 3
David Grocott
Cyber Threat Defender; the collectible card game
TEXAS BALLROOM - D Hackers Lair
Dr. Greg White
1:00pm CDT
WA1015 - Web App Pentesting for Bug Hunters
SEGUIN 4-B AREA 51
Phillip Wylie
2:15pm CDT
RT-1050 Calishing: A Red Team Approach to Phishing Google Calendar
TEXAS BALLROOM - F Track 2
Antonio Piazza
3:30pm CDT
TH-1015 Finding the Rogue Node
BONHAM 3-C | Expert 1
Donovan Farrow
5:00pm CDT
Closing Ceremony
TEXAS BALLROOM - A/B | Keynote - CISO
Timezone
Texas Cyber Summit II
America/Chicago
Filter By Date
Texas Cyber Summit II
Oct 10
-
12, 2019
Thursday
, October 10
Friday
, October 11
Saturday
, October 12
Filter By Venue
600 East Market Street, San Antonio, TX, USA
Sort schedule by Venue
BONHAM 3-B | Bee'ing New
BONHAM 3-C | Expert 1
BONHAM 3-D | Expert 2
BONHAM 3-E | Expert 3
BONHAM 3-X Common Area Stage *End of Hall
CROCKETT 4-D ICS SCADA HAVEN
Expo Business Center
REPUBLIC 4-A
REPUBLIC 4-C
SEGUIN 4-B AREA 51
SEGUIN A - 4th Floor
TEXAS BALLROOM - A/B | Keynote - CISO
TEXAS BALLROOM - C Track 1
TEXAS BALLROOM - D Hackers Lair
TEXAS BALLROOM - E Track 3
TEXAS BALLROOM - F Track 2
Filter By Type
Advanced
All
Forensics
Hacking
Packet Captures
Python
Red Team
Briefing
All
Blue Team
Business
Hunting
Pen Testing
Red Team
Car Hacking
All
Exploits
Career Fair
All
Resume Review
Challenge
All
Hacking
Scada
Competition
All
Adults
Blue Team
Hacking
Hunting
Compliance
All
CISO
Containers
All
Hacking
Hands-On
All
Blue Team
Forensics
GHIDRA
Hacking
Malware Analysis
Packet Captures
Webapps
Workshop
Incident Response
All
Hunting
Intermediate
All
Analysis
Blue Team
CISO
Exploits
Forensics
Hacking
Hacking DirectTV
IDENTITY MANAGEMENT
Intrusion Detection
IoT
IoT Emedded Devices
Mobile
Packet Captures
Privacy
Red Team
Supply Chain
Webapps
Introduction
All
Blue Team
Career
Cloud Computing
Domain Name Services
GHIDRA
Hunting
PenTesting
Privacy
Red Team
Scada
Webapps
Keynote
All
Artificial Intelligence
Hacking
LUNCH ON YOUR OWN
Monitoring
All
Intrusion Detection
Sales Solutions Brief
All
Marketing
Social
All
Adults
Social Engineering
All
Hacking
Training
All
PenTesting
Company
BI.ZONE
BitDefender
CarbonBlack
Critical Start
CSA
DEVO
FireEye
Forge Point Capital
Fortinet
FSI.IO
McAfee
Microsoft
Mitre
NotSoSecure
Oracle
Palo Alto Networks
ReconInfoSec
RedTeam Nation
SpecterOps
SphereNY
Tanium
TrustedSec
UpGuard
USAA
Audience
Advanced
Beginner
Career Search
CISO
Keynote
Memory Agent
midlevel
Subject
AppSec
Architecture
blue team
Botnet
Business
CIS
DevOps
DevSecOps
Digital Transformation
Embedded
Exploits
Hacking
Hunting
incident response
IoT
MacOS
Malware
Model View Controller
OWASP
Packets
red team
Reverse Engineering
SIEM
Threat Intelligence
Area
Deep Walk-Through
Focused Talk
Hands-on
moloch
Monitoring
Product/Services
Reverse Engineering
Popular
Recently Active Attendees
David Marsh
Arturo de los Santos
Phillip Wylie
Chris Woehl
Luis Cacho
Jeff Reich
AS
Aaron Schoenrock
DZ
Dustin Zahradnik
More →
Filter sessions
Apply filters to sessions.
Filtered by
Type
(Introduction) -
Clear filter
close
Dates
Thursday
, October 10
Friday
, October 11
Saturday
, October 12
Types
Advanced
All
Forensics
Hacking
Packet Captures
Python
Red Team
Briefing
All
Blue Team
Business
Hunting
Pen Testing
Red Team
Car Hacking
All
Exploits
Career Fair
All
Resume Review
Challenge
All
Hacking
Scada
Competition
All
Adults
Blue Team
Hacking
Hunting
Compliance
All
CISO
Containers
All
Hacking
Hands-On
All
Blue Team
Forensics
GHIDRA
Hacking
Malware Analysis
Packet Captures
Webapps
Workshop
Incident Response
All
Hunting
Intermediate
All
Analysis
Blue Team
CISO
Exploits
Forensics
Hacking
Hacking DirectTV
IDENTITY MANAGEMENT
Intrusion Detection
IoT
IoT Emedded Devices
Mobile
Packet Captures
Privacy
Red Team
Supply Chain
Webapps
Introduction
All
Blue Team
Career
Cloud Computing
Domain Name Services
GHIDRA
Hunting
PenTesting
Privacy
Red Team
Scada
Webapps
Keynote
All
Artificial Intelligence
Hacking
LUNCH ON YOUR OWN
Monitoring
All
Intrusion Detection
Sales Solutions Brief
All
Marketing
Social
All
Adults
Social Engineering
All
Hacking
Training
All
PenTesting
Venues
BONHAM 3-B | Bee'ing New
BONHAM 3-C | Expert 1
BONHAM 3-D | Expert 2
BONHAM 3-E | Expert 3
BONHAM 3-X Common Area Stage *End of Hall
CROCKETT 4-D ICS SCADA HAVEN
Expo Business Center
REPUBLIC 4-A
REPUBLIC 4-C
SEGUIN 4-B AREA 51
SEGUIN A - 4th Floor
TEXAS BALLROOM - A/B | Keynote - CISO
TEXAS BALLROOM - C Track 1
TEXAS BALLROOM - D Hackers Lair
TEXAS BALLROOM - E Track 3
TEXAS BALLROOM - F Track 2