0815-0900
REGISTRATION
0900-0905
Welcome
0905-0935
Keynote
0935-1005
Mossad Dot Com: How Iran Is Using Fake Job Sites and Movie Studios to Catch Moles
1005-1035
Cyber War on the Edge: A Balance of Access and Action
Gabby Roncone and John Wolfram
1035-1050
Break
1050-1120
Rising Tide Redux: Exploring Leviathan’s Supply Chain Attacks and Ties to Kinetic Naval Intervention in the South China Sea
1120-1150
Breaking the Silos and Speaking One Language: the Online Operations Kill Chain
1150-1220
Protonpilled: Assessing recent probable Russian intelligence hack-and-leak
Michael van Landingham, Chris Bing, and Raphael Satter
1220-1320
Lunch Provided By Recorded Future
1320-1430
LIGHTNING ROUND
China Stands Up
They are Still Berserk: Recent Activities of BROMINE
Demystifying threats to satcom usage in critical infrastructure
ZINC weaponizing open-source software
Matthew Kennedy and Tim Stober
Niezależny Dziennik Polityczny: Polish-Language IO Campaign’s Role within Russia’s Propaganda and Disinformation Ecosystem
Russia’s Wartime Cyber Operations in Ukraine: Military Outcomes and Drivers
Assessing the Political Motivations Behind Ransomware Attacks
1430-1500
PRC's Use of Mobile Surveillance for Tracking the Uighur population in China and Abroad
1500-1515
Snack Break provided by AESIR Security
1515-1545
What’s good for the goose is good for the gander: Prigozhin interests and Russian IO
1545-1615
Spamouflage Goes to the Polls: Chinese State-Aligned Narratives in the Leadup to the Midterms
1615-1645
The Phantom Menace: a tale of Chinese nation state hackers
Mark Parsons, Judy Ng, and Ben Koehl
1645-1700
closing remarks
1700-1900