AGENDA

2:00: Door Opens + Registration

2:30 – 3:00: Open Remarks + CTF Introduction

2:45 - 3:00: Cyber Threat Intelligence Overview - Kyle Kholer

3:00 – 4:00: WORKSHOP: Introduction to Machine Learning - Sam Bowne

4:00 – 5:00: PANEL: Drop the BULLSHIT in AI - The Good, the Bad, and the WHAT?

5:00 – 6:00: TALK: Offensive Security Awareness - Phillip Wylie

Kyle Kohler, Sr. Sales Engineer at Recorded Future will provide a high level overview of Cyber Threat Intelligence functions that are becoming a common role for security practitioners nationwide. The role of threat intelligence is accelerating every security mission within organizations big and small, and Kyle will share customer stories on how organizations and world governments are using open source, deep/dark, and technical telemetry intelligence to make faster and more confident decisions in their support of various business units.

KYLE KHOLER

WORKSHOP

Abstract:

Covers machine learning functionality, attacks and defenses. We'll attack public Large Learning Models with prompt injection, and make custom machine learning models with Python. We'll create various models including linear regression, polynomial regression, and Support Vector Machines, train them, and evaluate their performance. Projects include computer vision, breaking a CAPTCHA, deblurring images, regression, and classification tasks. We will perform poisoning and evasion attacks on machine learning systems, and implement deep neural rejection to block such attacks.

No experience with programming or machine learning is required, and the only software required is a Web browser. We will use TensorFlow and SecML on free Google Colab cloud systems.

INTRODUCTION TO MACHINE LEARNING

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, Black Hat USA, HOPE, BSidesSF, BSidesLV, RSA, and many other conferences and colleges. He founded Infosec Decoded, Inc., and does corporate training and consulting for several Fortune 100 companies, on topics including Incident Response and Secure Coding.

SAM BOWNE

PANEL

Abstract:

Covers machine learning functionality, attacks and defenses. We'll attack public Large Learning Models with prompt injection, and make custom machine learning models with Python. We'll create various models including linear regression, polynomial regression, and Support Vector Machines, train them, and evaluate their performance. Projects include computer vision, breaking a CAPTCHA, deblurring images, regression, and classification tasks. We will perform poisoning and evasion attacks on machine learning systems, and implement deep neural rejection to block such attacks.

No experience with programming or machine learning is required, and the only software required is a Web browser. We will use TensorFlow and SecML on free Google Colab cloud systems.

DROP THE BULLSHIT IN AI

Diane Lin is the co-founder and CTO of Culminate. She was director of ML at Zscaler. Previously, she worked on few-shot learning at Vicarious (acquired by Google DeepMind). Before that, she was part of the Amazon Alexa team. Her work on one-shot learning at MIT influenced the chain-of-thought underlying OpenAI’s chatGPT. She has 15 years of experience in AGI and holds a Ph.D. from Imperial College of London.

Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security-Art, an information security consulting firm, and before that he was SOC Team Leader at Radware. (NASDQ: RDWR).

Joe Hall, a cybersecurity expert with more than 20 years of experience in network security and risk mitigation, now Head of Security Services at Nile. Prior to joining Nile, Hall held numerous security engineering positions at Fortinet, Sophos, Symantec PGP, Dell Sonicwall, American Express, and Solera Networks. As a forward-thinking leader at these large companies, Hall’s experience includes supporting the launch of Dell’s SuperMassive Next-Gen Firewall Series and training hundreds of support technicians on various enterprise security product lines. He also was responsible for deploying the worlds largest GCP network as well as protecting the 2016 Olympics in Rio. Joe and his wife Christine live in Paradise Valley, Arizona with their four teenagers and two dogs. You will find them doing something active like riding One Wheels, mountain biking, paddle boarding, or racing in triathlons. Hall is a serial entrepreneur with a hunger to build and innovate.

ITZIK KOTLER

JOE HALL

DIANE LIN

MALCOM HARKINS

CHIEF SECURITY

&

TRUST OFFICER

HiddenLayer

CO-FOUNDER

&

CTO

Culminate

CO-FOUNDER

&

CTO

SafeBreach

Nile

HEAD OF SECURITY SERVICES

Malcolm Harkins

Chief Security & Trust Officer, Board Member, Advisor, Mentor/Coach

Malcolm Harkins is the Chief Security and Trust Officer at HiddenLayer. In this role he reports to the CEO and is responsible for enabling business growth through trusted infrastructure, systems, and business processes. Malcolm is also responsible for peer outreach activities to drive improvement across the world in the understanding of cyber risks as well as best practices to manage and mitigate those risks. He is also an independent board member and advisor to several organizations and CISO Ambassador for Reveald. He enjoys being an executive coach to CISOs and others in a wide variety of information risk roles. Key areas of focus include the ethics around technology risk, social responsibility, total cost of controls, public policy, and driving more industry accountability.

TALK

Abstract:

Offensive security is an essential part of a cybersecurity program, but it is often misunderstood, which could lead to not achieving the goals of an organization. An example of a lack of understanding is requesting the wrong type of assessment, such as an adversary emulation instead of a pentest.

OFFENSIVE SECURITY AWARENESS

Phillip Wylie is a Customer Success Lead and Offensive Security Evangelist at Horizons3.ai. He is a cybersecurity professional with over 20 years of industry experience. He is also a former Dallas College Adjunct Instructor. Phillip has diverse experience in multiple cybersecurity disciplines, including network security, application security, and pentesting. As an offensive security professional with over a decade of experience, he has conducted pentests of networks, Wi-Fi networks, applications, red team operations, and social engineering.

Phillip’s contributions to the cybersecurity industry extend beyond his work as a pentester. He is the concept creator and co-author of “The Pentester Blueprint: Starting a Career as an Ethical Hacker,” a highly regarded book inspired by a lecture he presented to his class at Dallas College, which later became a conference talk. Phillip hosts “The Phillip Wylie Show” and previously “The Hacker Factory Podcast.”

PHILLIP WYLIE