Agenda

PROTECTCON > Agenda

Day 1

10:00
---
10:30
Chris Cox

Introduction

10:30am
---
11:30
Katelyn Bowden

Why your privacy matters, and how to take it back!

This talk will discuss the various ways that social media companies have misused our private data, and will explore the various ways to start taking our data back- we will cover the data economy, secure communications, decentralized networks, and ways each of us can take back control!

11:30
---
11:35

11:35
---
12:00
Shannon Miller

Privacy Fundamentals: Precautions and Practices

We all have someone or something we want to protect. Understanding your threat model, the basics of secure communication, and how to protect your privacy and digital devices is essential to staying safe. This talk focuses on assessing risk, account security and understanding your digital footprint.

12:05
---
1:05

1:05
---
2:05
Bryson Bort

Security “Choose Your Own Adventure”

In the vein of old school Choose Your Own Adventures, this is a custom created story that leads the audience through an incident response including technical and business considerations. The audience votes through a live poll on decision points in the story including detection, identification, response, remediation, and threat hunting for like compromises. Communication with the appropriate stakeholders and your team is key throughout the phases. The core "story" will be the majority of the session, but will generate significant discussion and Q&A. After the talk, we will release a free tool that will allow the audience to continue to play and learn on their own through the different decision points.

"I created this exercise (and corresponding tool) as a new way to engage an audience to teach Blue Team concepts in process, organizational considerations, and technical techniques beyond the standard Powerpoint lecture. It has been play-tested with over 1000 players and found that it works well from beginner to expert level in facilitating discussion and insights."

2:05
---
2:10

2:10
---
3:10
Alyssa Miller

Keynote Presentation

Alyssa Miller is internationally recognized within the cybersecurity community and has presented at some of the top cybersecurity and industry events around the globe. As a published author and advocate within the community, Alyssa focuses on reshaping the interconnection of cybersecurity practices with very human needs. In this keynote address, Alyssa shares her thoughts on security and technology, and how they combine to support survivors.

3:10
---
3:15

3:15
---
4:15
Ruddy Wang

Securing and Protecting Mobile Devices

For most of us, our lives are kept on our mobile devices. We keep pictures there. Our schedules. Our communication. Even our finances. For anyone, the impact of a data breach or security incident is immeasurable, but for survivors of abuse it can be a matter of life and death. Ruddy Wang shares techniques for securing mobile devices even when the abuser has access to them.

Day 2

10:00
---
10:30
Chris Cox

Introduction Day 2

10:30
---
11:30
Julie Beck

Survivor to Hunter: An Overcomer’s Story of Surviving Domestic Violence and Cult Control

Survivor to Hunter: An Overcomer’s Story of Surviving Domestic Violence and Cult Control Julie Beck

11:35
---
12:05
Edna Jonsson

Revenge porn and deep fake image shakedowns

This talk covers Non-consensual intimate image abuse, commonly known as revenge porn, as well as deep fake images, how these images can be used to hold power over others and what you can do to take back your power and agency over your images. In this talk you get step by step instructions on what to do if you have images shared online.

12:05
---
1:05

1:05
---
2:05
Sajolida, The Tor Project

How to use Tails, The Amnesic Incognito Live System, for secure communications

Tails, "The Amnesiac Incognito Live System," is a computer operating system designed to protect the user. Because it usually boots from a USB drive, it bypasses the computer's hard drive and doesn't leave a trace of what's been done. This can allow a survivor to communicate with their support system or search for resources without leaving signs on a shared computer. This talk will show how to configure and use Tails safely.

2:05
---
2:10

2:10
---
3:10
Will Baggett

Dark Web and Open Source Investigations into Child Exploitation Groups

Samantha Gamble has built a career around identifying, unmasking, and disrupting CSAM groups and other bad actors. In this presentation, Samantha will share some of her experiences targeting the worst groups on the internet.

3:10
---
3:15

3:15
---
4:15
Samantha Gamble

Broken Arrow: Detangling Domestic Disputes Digitally

I will present the playbook used to assist domestic abuse victims in detangling their domestic abuser from their digital footprint. This talk is the core of our intake process at OSE, where I provide a methodology to identify the most common methods of domestic stalking that a non-technical person can use to assist a survivor. I cover cellular, social media, financial, and fiscal areas where most attackers can be mitigated as well as proper documentation steps to assist the end user.

4:15
---
4:30

Questions Assessment

In this session, we'll talk about your needs and how our tech and security nerds can meet them. We want to figure out ways we can better support you with free tools, information, and resources.