Navigate
Navigate
Presentations
Event Check-In
Opening Remarks
Keynote - From Cybersecurity to Shark Tank: Insights from Robert Herjavec and Jerry Geisler
GSOC Virtual Tour with Jason Jackson & Sara Lockman
Keynote - Fraud at Your Fingertips: SMS Scams and Social Engineering with Steven Atnip
Operational Tech: What is it and why should I care? with Jeremy Grant and Brent Burroughs
Break for Lunch
Keynote - Critical Thinker
Balancing Risk with Speed of Delivery: A Pragmatic Approach for Cybersecurity Professionals (Host: Jesse Tadlock, Panel: Angel Johnson, Tony Robey, Sean Liu, and Rick Ault)
Keynote - Democratic People’s Republic of Korea (DPRK) Targeting with FBI Supervisory Special Agent (SSA) Tonja Hill and FBI Special Agent Chris Nissen
AI: A Rapidly Evolving Threat Landscape with Matt Buhler
Lock & Dock: Securing Secrets and Containers (Host: Philip Kramer, Panel: Jack Cauldwell , Saumya Mishra, Gagandeep Sharma)
Closing Remarks
After Party
keyboard_arrow_left
keyboard_arrow_right
Presentations
Event Check-In
Opening Remarks
Keynote - From Cybersecurity to Shark Tank: Insights from Robert Herjavec and Jerry Geisler
GSOC Virtual Tour with Jason Jackson & Sara Lockman
Keynote - Fraud at Your Fingertips: SMS Scams and Social Engineering with Steven Atnip
Operational Tech: What is it and why should I care? with Jeremy Grant and Brent Burroughs
Break for Lunch
Keynote - Critical Thinker
Balancing Risk with Speed of Delivery: A Pragmatic Approach for Cybersecurity Professionals (Host: Jesse Tadlock, Panel: Angel Johnson, Tony Robey, Sean Liu, and Rick Ault)
Keynote - Democratic People’s Republic of Korea (DPRK) Targeting with FBI Supervisory Special Agent (SSA) Tonja Hill and FBI Special Agent Chris Nissen
AI: A Rapidly Evolving Threat Landscape with Matt Buhler
Lock & Dock: Securing Secrets and Containers (Host: Philip Kramer, Panel: Jack Cauldwell , Saumya Mishra, Gagandeep Sharma)
Closing Remarks
After Party
Democratic People's Republic of Korea (DPRK) Targeting
April 12, 2025 | 2:55 p.m. | 45 min
North Korean actors targeting United States based employers for revenue generation and malicious cyber activity.
The presentation will cover the social engineering North Korean actors use to successfully gain employment at United States companies to generate revenue for the regime and, when possible, deploy malicious software to exfiltrate data for attempted ransom or proliferation to state-actors.
Presenters
minimize chat, to return to chat, click on live chat
Loading...
For any assistance related to live chat, please contact
800-421-1362