Sept 10th and 11th, 2025

Venue#

The conference will be held at the Appian Conference Center in McLean, VA.

7950 Jones Branch Dr McLean, VA 22102

Appian

Hotels#

HotelAddressBooking Link
Residence Inn Tysons8400 Old Courthouse Road Vienna, Virginia, USA, 22182Click here
Hyatt Regency Tysons Corner Center7901 Tysons One Place, Tysons, Virginia 22102Click here

Other Hotels#

Hotel NameAddressBooking Link
Hilton McLean Tysons Corner7920 Jones Branch Dr, McLean, VA 22102 (Walking distance to conference)Click here
Courtyard Tysons McLean1960-A Chain Bridge Rd, McLean, VA 22102Click here
Extended Stay America - Tysons Corner8201 Old Courthouse Rd, Vienna, VA 22182.Click here

Event Summary#

Start DateEnd DateLast Day to Book
September 10, 2025September 11, 2025TBD

Additional Accommodations#

If the recommended hotel is unavailable, it is suggested that you book at one of these area hotels:

Coming soon

Ops Track#

Day 1 - September 10#

TopicSpeakerStartEnd
Opener8:459:00
Keynote9:009:40
Transition to Tracks9:409:50
LLMs as a Force Multiplier: Practical Patterns for Security Teams9:5010:15
The Challenges of AI Logging10:1511:00
DFIR-as-Code: Scaling Incident Response Beyond Human Limits11:0011:45
Lunch11:4512:50
Ghosts In The Wild: Hunting the Unseen in the Internet Noise12:5013:15
JA4+ Network Fingerprints vs. Threat Actors13:1514:00
Cloud Guardrails: A Practical Field Guide to Success14:0014:25
Break14:2514:40
CHA vs. PTA: A Defender’s Guide to Smarter Static Analysis14:4015:05
FIDO2: you can too15:0515:50
Stopping the Next Zero Day: Taking ROP Attacks Off the Table15:5016:35
Wrap Up16:3516:50
Happy Hour16:5018:50

Day 2 - September 11#

TopicSpeakerStartEnd
Keynote9:009:40
Transition to Tracks9:409:50
AIBOM: Powering Transparency and Security in AI and Software Supply Chains9:5010:35
Unseen in the Stack: Mapping Hidden Dependencies for Operational Defense11:0011:45
Lunch11:4512:50
Threats Don’t Wait—Neither Should You! Automating Threat Response12:5013:35
Break14:5515:10
Wrap Up17:1017:25

Philosophy Track#

Day 1 - September 10#

TopicSpeakerStartEnd
Opener8:459:00
Keynote9:009:40
Transition to Tracks9:409:50
Mental Models for AI and Agentic AISounil Yu9:5010:30
The Liberty Lenses: a cyber organizational risk assessment methodologyAmanda Draeger10:3011:10
Improving Threat Detection ResilienceAugusto Barros11:1011:50
Lunch11:5012:50
Does DoD Level Security Work in the Real World?Jeff Man12:5013:35
Borrowed Shields: Cyber Cooperation in CrisisApril Lenhard13:3514:20
Break14:2014:40
ACoD: Elevating HeroesChris Cooley14:4015:20
The Long and Winding Road: Communication Frameworks for Threat Hunters and Incident RespondersDallas Moore15:2016:00
Turn your SOC into Minority ReportDaniel Goldenberg16:0016:40
Wrap Up16:4016:50
Happy Hour16:5018:50

Day 2 - September 11#

TopicSpeakerStartEnd
Keynote9:009:40
Transition to Tracks9:409:50
Diseconomies of Scale: Re-examining our assumptions about scale in the Age of AISounil Yu9:5010:30
Non-Security Metrics for Cybersecurity Assessments: Defense EditionJC Herz10:3011:10
Product Security Incident Response at a Fortune 500 SaaSGarrett McNamara11:1011:50
Lunch11:5012:50
Embracing Your Villain Era. Or: How Teaching CTI Has Taught Me To Stop Worrying and Love The BombApril Lenhard12:5013:35
Platform vs. Point Solution: What Are We Actually Optimizing For?Valerie Z13:3514:20
Break14:2014:40
The Era of Logging-In Instead of Hacking-In: How Bad is Information Stealer Malware in 2024?Nick Ascoli14:4015:20
Control Efficacy - “not a thing” but it should be!Pete Lindstrom15:2016:00
Measuring Privilege: Putting numbers to “least privilege”Sounil Yu16:0016:40
Wrap Up16:4016:50