Loading…
Streaming: https://mssvideo.vcu.edu/RVAsec
Type: Technical clear filter
arrow_back View All Dates
Tuesday, June 9
 

11:00am EDT

Hacking Customized IDE Distributions: Methodology Behind Six Figures in Bug Bounties
Tuesday June 9, 2026 11:00am - 11:50am EDT
Customized IDE distributions pose a lucrative attack surface due to the interconnected systems they interact with, usually highly privileged. This talk covers high level technical ecosystem architectures, IDE threat modeling, common attack vectors, and takes a stab at defining an IDE exploitation kill chain. While specific bug bounty targets and findings remain undisclosed, the methodology developed while producing them will be covered.
Speakers
avatar for Nick Copi

Nick Copi

Full Time Bug Bounty Hunter
Nick Copi is a full time bug bounty hunter targeting web applications, cloud infrastructure, desktop apps, and pretty much anything with an attack surface. His background spans application security engineering, full stack development, and a long track record of CTF competition wins... Read More →
Tuesday June 9, 2026 11:00am - 11:50am EDT
Upstairs, Grand Ballroom F/G

1:00pm EDT

I Called Your AI Agent and It Told Me Everything: Live Voice AI Red Teaming
Tuesday June 9, 2026 1:00pm - 1:50pm EDT
You'll leave this talk understanding:
  1. How voice AI agents are architecturally different from text chatbots
  2. The specific attack vectors unique to voice: transcription manipulation, DTMF injection, audio-layer prompt injection, and social engineering through vocal tone
  3. A repeatable methodology for testing voice AI systems in your own organization
  4. Concrete remediation strategies for the most common findings
Speakers
avatar for Brian Cardinale

Brian Cardinale

Principal Security Researcher, SecureCoders
Brian Cardinale is the Principal Security Researcher at SecureCoders and creator of the TEAPOT methodology for voice AI red teaming. He holds a CISSP and has spent his career breaking things that aren't supposed to break. Brian built VoiceGoat, the first open-source vulnerable voice... Read More →
Tuesday June 9, 2026 1:00pm - 1:50pm EDT
Upstairs, Grand Ballroom F/G

2:00pm EDT

Social Engineering The Machine: When Your Target Runs On Attention Instead Of Anxiety
Tuesday June 9, 2026 2:00pm - 2:50pm EDT
Every AI talk this year will tell you prompt injection is a problem. This one gives you the methodology to actually exploit it. Borrowing from decades of adversarial human testing, we’ll move past "vibes" and "jailbreak screenshots" to build a working, repeatable framework for social engineering the machine.
Speakers
avatar for Jason Ross

Jason Ross

Product Security Principal, Salesforce
With 20+ years in cyber security, Jason Ross now performs adversarial testing and defense of deployed generative AI applications, agentic systems, and the LLMs powering them at Salesforce. Jason's work focuses on prompt injection attacks and defense, model governance and security... Read More →
Tuesday June 9, 2026 2:00pm - 2:50pm EDT
Upstairs, Grand Ballroom F/G

3:00pm EDT

Robots vs Robots – Securing AI and the Data that Powers It
Tuesday June 9, 2026 3:00pm - 3:50pm EDT
As AI systems, copilots, and autonomous workflows proliferate, defenders must secure not only the data that fuels them, but the AI behaviors, access paths, and automation they introduce. Robots vs. Robots explores how organizations can protect AI systems end‑to‑end by controlling data exposure, governing AI access, and using automation to stay ahead of adversaries.
Tuesday June 9, 2026 3:00pm - 3:50pm EDT
Upstairs, Grand Ballroom F/G

4:00pm EDT

Breaking Tokens: Modern Attacks on OAuth, OIDC, and JWT Auth Flows
Tuesday June 9, 2026 4:00pm - 4:50pm EDT
As applications embrace OAuth, OIDC, and JWTs for federated authentication, attackers are shifting focus to token abuse and logic flaws rather than password theft.
This talk explores how modern auth systems can be compromised through token replay, session fixation, and insecure implementation of identity protocols.

We’ll walk through real-world examples — including intercepted tokens, replayed sessions, and privilege escalations through misconfigured scopes and claims.
We’ll also demonstrate a purpose-built lab environment and open-source tooling to analyze and detect these flaws, helping teams validate their own auth integrations.

Finally, we’ll discuss secure patterns for token handling, revocation, and identity proofing that can prevent these modern attacks before they reach production.
Speakers
avatar for Bhaumik Shah

Bhaumik Shah

CEO, SecurifyAI
Bhaumik Shah is a cybersecurity leader and founder of Securify, where he helps organizations secure their cloud, applications, and infrastructure through penetration testing, red team operations, and compliance programs like SOC 2 and ISO 27001. With over a decade of experience uncovering... Read More →
Tuesday June 9, 2026 4:00pm - 4:50pm EDT
Upstairs, Grand Ballroom F/G
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -