Loading…
Streaming: https://mssvideo.vcu.edu/RVAsec
Type: 101 clear filter
Tuesday, June 9
 

11:00am EDT

A Peek Behind the Curtain: How A.I. Works
Tuesday June 9, 2026 11:00am - 11:50am EDT
“A Peek Behind the Curtain: How A.I. Works” offers a clear, non-technical tour of how modern AI systems learn from data and generate predictions or content. The talk demystifies key concepts like training, inference, and model limitations so attendees can better understand what AI can—and can’t—do.
Speakers
avatar for David Reign

David Reign

Security Analyst, Oracle
David Reign is a Security Analyst at Oracle with seven years of experience in information security, including three years supporting enterprise environments at scale. His work focuses on cloud security, virtualization, and strengthening security posture through practical risk management... Read More →
Tuesday June 9, 2026 11:00am - 11:50am EDT
Downstairs, Madison / Jefferson / Monroe

1:00pm EDT

Building Custom Detections with Zeek and Spicy
Tuesday June 9, 2026 1:00pm - 1:50pm EDT
Discover how to use Zeek in order to create custom detections for network threats. We will go over how to create a real detection using Zeek via scripting, protocol analysis, and log analysis.
Zeek is a network monitoring tool that analyzes network traffic with custom analyzers and produces logs. This talk will go over a real threat from beginning to end. This talk will walk through a Redis RCE exploit (eg https://medium.com/@knownsec404team/rce-exploits-of-redis-based-on-master-slave-replication-ef7a664ce1d0) based on master-slave replication and how Zeek can be used to detect it. This will also go over Spicy, a protocol parser generator, and how it helps to detect cases like this.
Speakers
avatar for Evan Typanski

Evan Typanski

Senior Software Engineer, Corelight
Evan is currently a software engineer at Corelight, a network monitoring startup. He is on the open source team, where he works as a maintaner for the Zeek project. His focus is on compilers and low level networking.

Before joining Corelight, Evan worked on static code analysis (SAST) for languages like C/C++, Swift, and Rust. He graduated from the University of Virginia with a BS in Computer Science in 2020... Read More →
Tuesday June 9, 2026 1:00pm - 1:50pm EDT
Downstairs, Madison / Jefferson / Monroe

2:00pm EDT

Troubleshooting: Where Information Meets WTF
Tuesday June 9, 2026 2:00pm - 2:50pm EDT
As an Offensive Security Consultant, I often joke that my job is 90% troubleshooting and 10% breaking things. Truthfully, developing the skill and methodology for finding the right information, tools, or techniques and implementing them when things get borked is at the heart of hacking. Similarly, that same skill if applied to our attitude, health, relationships, and career can make the difference between a steady pace and quickly flaming out in life.

This talk is aimed at folks who are currently employed in Cybersecurity, those looking to transition in, and those who are ready to transition out - basically anyone! We'll talk about what troubleshooting is, and how developing an effective strategy in troubleshooting technical things can apply to the non-technical aspects of life with some real-world examples, audience participation, and some practical tips to ground this concept into everyday life.
Speakers
avatar for Aqeel Yaseen

Aqeel Yaseen

Offensive Security Consultant, RedHelm
Aqeel Yaseen transitioned into Offensive Security from over a decade of teaching yoga and mentoring mindfulness based retreats professionally, and is currently working with RedHelm. That might seem like a curious combination, but Pentesting and teaching yoga both help people cultivate... Read More →
Tuesday June 9, 2026 2:00pm - 2:50pm EDT
Downstairs, Madison / Jefferson / Monroe

3:00pm EDT

Beyond the Tip of the Iceberg: Undercover HUMINT Operations Inside the Ransomware Ecosystem
Tuesday June 9, 2026 3:00pm - 3:50pm EDT
Ransomware attacks are the visible event. The access economy enabling them is not. This session maps that economy — how access is acquired, automated, and converted into ransomware deployment — using intelligence from years of undercover operations inside the criminal underground. Attendees will leave with a working model of how initial access brokers operate, and a concrete illustration of how fast CVE exploitation moves from public disclosure to active resale: in February 2026, operatives observed IABs selling confirmed access attributed to a critical BeyondTrust vulnerability within 17 days of vendor advisory. The session closes with a case study of an ALPHV affiliate whose documented operational mistakes contributed to a DOJ prosecution — and a framework for how the private-sector-to-law-enforcement intelligence loop works when it functions correctly.
Speakers
avatar for Thomas Nance

Thomas Nance

Director of Intelligence Services, Darkweb IQ
Thomas Nance is the Director of Intelligence Services at Darkweb IQ and a former CIA Operations Officer, where he conducted espionage and counterterrorism missions built on human source development and clandestine collection. He specializes in applying HUMINT tradecraft to cybercrime... Read More →
Tuesday June 9, 2026 3:00pm - 3:50pm EDT
Downstairs, Madison / Jefferson / Monroe

4:00pm EDT

Community is a Control: Strengthening Cybersecurity Through Connection
Tuesday June 9, 2026 4:00pm - 4:50pm EDT
In cybersecurity, we spend a lot of time talking about new CVEs, what tools could fill this gap, how can we automate this, and how we can use AI here. We debate coverage, stack optimization, and detection engineering. At the same time, many teams are operating under negative budgets, understaffing, and constant pressure to do more with less.

What we don’t talk about enough is the role people play in all of this.
Speakers
avatar for Chelsea Bryan

Chelsea Bryan

Security Analyst, VCU
Tuesday June 9, 2026 4:00pm - 4:50pm EDT
Downstairs, Madison / Jefferson / Monroe
 
Wednesday, June 10
 

10:30am EDT

The Interview Engine: A Career Readiness Framework
Wednesday June 10, 2026 10:30am - 11:20am EDT
Cybersecurity is about mitigating risk at acceptable cost, and hiring works the same way. This talk pulls back the curtain on how recruiting actually works, then gives security professionals an engineering-minded framework for staying career-ready without waiting for the layoff to start thinking about it.
Speakers
avatar for Vas Khomyk

Vas Khomyk

Sr. Recruiting Consultant, Hampton North
Vas Khomyk is a technical recruiter with Hampton North, a cybersecurity-focused recruiting firm. He runs retained and contingent searches across cybersecurity, defense, and enterprise IT, helping companies fill challenging roles from senior security engineering to VP-level leadership... Read More →
Wednesday June 10, 2026 10:30am - 11:20am EDT
Downstairs, Madison / Jefferson / Monroe

11:30am EDT

The State of Information Security Today
Wednesday June 10, 2026 11:30am - 12:20pm EDT
The speaker has been in the Information (cyber) security since the late 1900s and will take a look back at the challenges we faced in the beginning and how these challenges have changed and evolved over the past several decades. You think we're doing okay? Let me change your mind.
Speakers
avatar for Jeff Man

Jeff Man

Co-Host, Paul's Security Weekly
Jeff is a respected Information Security advocate, advisor, hacker, evangelist, mentor, teacher, international keynoter, speaker, former host of Security & Compliance Weekly, co-host on Paul's Security Weekly, Tribe of Hackers (TOH) contributor, including Red Team, Security Leaders... Read More →
Wednesday June 10, 2026 11:30am - 12:20pm EDT
Downstairs, Madison / Jefferson / Monroe

1:00pm EDT

Unlocking Awareness: How an Escape Experience made Security Fun, Engaging, and Approachable
Wednesday June 10, 2026 1:00pm - 1:50pm EDT
How do you turn security awareness from a check‑the‑box activity into a hands‑on, memorable experience for everyone? In this session, we’ll unpack a portable “escape room in a box” designed by our Information Security team to make learning approachable, collaborative, and fun.
Speakers
avatar for Joanna Behan

Joanna Behan

Information Security Analyst, FRB of Richmond
Joanna is an Information Security Analyst who brings a unique blend of creativity and expertise to the field. With a Bachelor of Fine Arts from James Madison University and industry-recognized certifications including CISSP and CGRC, Joanna‚Äôs career spans more than two decades... Read More →
Wednesday June 10, 2026 1:00pm - 1:50pm EDT
Downstairs, Madison / Jefferson / Monroe

2:00pm EDT

AI SOC and Securing your Environment
Wednesday June 10, 2026 2:00pm - 2:50pm EDT
This discussion is designed to help teams figure out where AI fits in their environment from an analysis perspective, it is vendor agnostic and includes agentic deployments, as well as AI SOC services, novel attack vectors from independent research, and the overarching philosophy of how the threat landscape has just massively changed and how to adapt to it.
Speakers
avatar for Ryan Bird

Ryan Bird

Security Engineer, GuidePoint Security
Ryan Bird moved to the MVA area in 2017 with his wife. He helped train the United States Army in their ASOT level one program as well as MCTOG in 29 Palms through 2019 with Obsidian Solutions Group before working at Annapolis Defense in a Maritime Security role. After Covid hit he... Read More →
Wednesday June 10, 2026 2:00pm - 2:50pm EDT
Downstairs, Madison / Jefferson / Monroe
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.