Here’s the link to the schedule!
Reserving your Spot
To reserve your spot for workshops, make sure to locate your RSVP email in your email that you used to sign up and fill out the google form. If you are having issues, please contact an organizer on the discord.
How to Use the Schedule?
So how exactly do I read this schedule? Anything that is green is a conference wide event, anything underlined is available online, and everything else falls into 1 of 4 tracks. You are more than free to hop around tracks during the conference or instead just work on the CTF in lieu of going to some workshops/talks.
What are the tracks?
- The blue track focuses on defensive security practices and strategies. This track is geared towards cybersecurity professionals whose role is to protect systems, networks, and data from threats.
- The red track centers on offensive security tactics, commonly associated with ethical hacking and penetration testing. This is for individuals interested in learning how to simulate attacks to identify vulnerabilities.
- The purple track is designed to blend elements of both the red and blue tracks, focusing on collaboration between offensive and defensive security teams. It’s ideal for attendees who want to understand how attack and defense strategies work together and learn new skills!
- The cyber overview track is meant for beginners and those who are new to the field of cybersecurity. This track provides a broad introduction to essential cybersecurity concepts and prepares attendees for more specialized topics.
Do I have to stay in one track?
- Absolutely not! Feel free to jump around tracks throughout the conference. We welcome you to learn new skills. Taking a break from workshops/talks to work on the CTF or network is also highly welcomed!
Want to know more about the speakers/workshop presenters? Check out their bios!
Speaker and Workshop Presenter Bios