Sept 10th and 11th, 2025
Venue#
The conference will be held at the Appian Conference Center in McLean, VA.
7950 Jones Branch Dr McLean, VA 22102

Hotels#
Recommended hotels (Discounted for ACoD Attendees)#
Hotel | Address | Booking Link |
---|
Residence Inn Tysons | 8400 Old Courthouse Road Vienna, Virginia, USA, 22182 | Click here |
Hyatt Regency Tysons Corner Center | 7901 Tysons One Place, Tysons, Virginia 22102 | Click here |
Other Hotels#
Hotel Name | Address | Booking Link |
---|
Hilton McLean Tysons Corner | 7920 Jones Branch Dr, McLean, VA 22102 (Walking distance to conference) | Click here |
Courtyard Tysons McLean | 1960-A Chain Bridge Rd, McLean, VA 22102 | Click here |
Extended Stay America - Tysons Corner | 8201 Old Courthouse Rd, Vienna, VA 22182. | Click here |
Event Summary#
Start Date | End Date | Last Day to Book |
---|
September 10, 2025 | September 11, 2025 | TBD |
Additional Accommodations#
If the recommended hotel is unavailable, it is suggested that you book at one of these area hotels:
Coming soon
Ops Track#
Day 1 - September 10#
Topic | Speaker | Start | End |
---|
Opener | | 8:45 | 9:00 |
Keynote | | 9:00 | 9:40 |
Transition to Tracks | | 9:40 | 9:50 |
LLMs as a Force Multiplier: Practical Patterns for Security Teams | | 9:50 | 10:15 |
The Challenges of AI Logging | | 10:15 | 11:00 |
DFIR-as-Code: Scaling Incident Response Beyond Human Limits | | 11:00 | 11:45 |
Lunch | | 11:45 | 12:50 |
Ghosts In The Wild: Hunting the Unseen in the Internet Noise | | 12:50 | 13:15 |
JA4+ Network Fingerprints vs. Threat Actors | | 13:15 | 14:00 |
Cloud Guardrails: A Practical Field Guide to Success | | 14:00 | 14:25 |
Break | | 14:25 | 14:40 |
CHA vs. PTA: A Defender’s Guide to Smarter Static Analysis | | 14:40 | 15:05 |
FIDO2: you can too | | 15:05 | 15:50 |
Stopping the Next Zero Day: Taking ROP Attacks Off the Table | | 15:50 | 16:35 |
Wrap Up | | 16:35 | 16:50 |
Happy Hour | | 16:50 | 18:50 |
Day 2 - September 11#
Topic | Speaker | Start | End |
---|
Keynote | | 9:00 | 9:40 |
Transition to Tracks | | 9:40 | 9:50 |
AIBOM: Powering Transparency and Security in AI and Software Supply Chains | | 9:50 | 10:35 |
Unseen in the Stack: Mapping Hidden Dependencies for Operational Defense | | 11:00 | 11:45 |
Lunch | | 11:45 | 12:50 |
Threats Don’t Wait—Neither Should You! Automating Threat Response | | 12:50 | 13:35 |
Break | | 14:55 | 15:10 |
Wrap Up | | 17:10 | 17:25 |
Philosophy Track#
Day 1 - September 10#
Topic | Speaker | Start | End |
---|
Opener | | 8:45 | 9:00 |
Keynote | | 9:00 | 9:40 |
Transition to Tracks | | 9:40 | 9:50 |
Mental Models for AI and Agentic AI | Sounil Yu | 9:50 | 10:30 |
The Liberty Lenses: a cyber organizational risk assessment methodology | Amanda Draeger | 10:30 | 11:10 |
Improving Threat Detection Resilience | Augusto Barros | 11:10 | 11:50 |
Lunch | | 11:50 | 12:50 |
Does DoD Level Security Work in the Real World? | Jeff Man | 12:50 | 13:35 |
Borrowed Shields: Cyber Cooperation in Crisis | April Lenhard | 13:35 | 14:20 |
Break | | 14:20 | 14:40 |
ACoD: Elevating Heroes | Chris Cooley | 14:40 | 15:20 |
The Long and Winding Road: Communication Frameworks for Threat Hunters and Incident Responders | Dallas Moore | 15:20 | 16:00 |
Turn your SOC into Minority Report | Daniel Goldenberg | 16:00 | 16:40 |
Wrap Up | | 16:40 | 16:50 |
Happy Hour | | 16:50 | 18:50 |
Day 2 - September 11#
Topic | Speaker | Start | End |
---|
Keynote | | 9:00 | 9:40 |
Transition to Tracks | | 9:40 | 9:50 |
Diseconomies of Scale: Re-examining our assumptions about scale in the Age of AI | Sounil Yu | 9:50 | 10:30 |
Non-Security Metrics for Cybersecurity Assessments: Defense Edition | JC Herz | 10:30 | 11:10 |
Product Security Incident Response at a Fortune 500 SaaS | Garrett McNamara | 11:10 | 11:50 |
Lunch | | 11:50 | 12:50 |
Embracing Your Villain Era. Or: How Teaching CTI Has Taught Me To Stop Worrying and Love The Bomb | April Lenhard | 12:50 | 13:35 |
Platform vs. Point Solution: What Are We Actually Optimizing For? | Valerie Z | 13:35 | 14:20 |
Break | | 14:20 | 14:40 |
The Era of Logging-In Instead of Hacking-In: How Bad is Information Stealer Malware in 2024? | Nick Ascoli | 14:40 | 15:20 |
Control Efficacy - “not a thing” but it should be! | Pete Lindstrom | 15:20 | 16:00 |
Measuring Privilege: Putting numbers to “least privilege” | Sounil Yu | 16:00 | 16:40 |
Wrap Up | | 16:40 | 16:50 |