Skip to Main Content

SmileyCon Agenda

Gain exclusive access to trainings and sessions, presented by TrustedSec's top experts in the field. A special keynote speaker will also be on hand to kick off the event!

Thursday, April 10, 2025

8:00 - 9:00am
Check-In Begins

9:00 - 10:00am
Breakfast

10:00am - 12:00pm
Tabletop Exercise
Presented by the TrustedSec Incident Response Team
Information regarding this Tabletop Exercise is coming soon!

12:00 - 1:00pm
CISO Panel Discussion
Moderated by Martin Bos
Step beyond the typical CISO conversation and into a session designed for cybersecurity leaders who need real, actionable strategies that won't break the bank. Our panel of experts will tackle technical challenges head-on, with discussions on preparing for unknown threats, aligning security strategies with business objectives, and innovating even with constrained resources.

Unlike other CISO panels, this session goes deeper into the technical side of cybersecurity leadership, providing practical solutions and insights you can apply immediately. To wrap up, the panel will engage in a collaborative brainstorming session, offering cutting-edge tactics and peer-driven approaches to enhance your organization's security posture in today’s dynamic threat environment.

1:00 - 2:00pm
Lunch

2:00 - 5:00pm
Deception-Driven Defense
Presented by Ben Mauch
In this interactive training session, participants will explore the strategic art of using deception to protect their organizations from potential adversaries. By implementing deception controls within their environment, defenders can identify security threats early in the attack chain. Drawing on methods used in military operations, this workshop will cover how psychological, cyber, technical, and physical deception tactics can serve as effective tools for early detection and response to both internal and external threats. Attendees will learn practical, low-cost techniques and tools that can be integrated into their defense strategies. The session focuses on easy-to-implement solutions designed to deceive, detect, and deflect adversaries while creating opportunities to strengthen organizational security posture.

2:00 - 5:00pm
NIST CSF 2.0
Presented by Chris Camejo & Steph Saunders
This comprehensive training session provides a concise and practical overview of the latest updates to the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and offers actionable insights for enhancing your organization's Information Security program. This session will guide participants through the key changes and improvements in NIST CSF 2.0, explaining how these updates impact cybersecurity practices and align with evolving industry needs. Attendees will learn how to effectively implement the new framework to bolster their security posture, streamline compliance, and better manage cybersecurity risks.

5:00 - 6:00pm
Cocktail Hour 

Friday, April 11, 2025

9:00 - 10:00am
Breakfast

10:00 - 11:00am
Opening Keynote
Presented by WWE Hall of Famer, Diamond Dallas Page

11:00am - 12:00pm
Adventures in Cloud Hacking: A Look at Modern Cloud Adversary Operations
Presented by Edwin David
This session offers a deep dive into the phases of Cloud Penetration Testing, with a focus on real-world attack paths within Azure cloud environments. Participants will explore critical cloud attack techniques, such as reconnaissance, password spraying, device code phishing, data theft in Entra ID, public storage blob exploitation, lateral movement through unsecured Azure applications, pivoting from cloud to internal networks, and seamless SSO impersonation abuses. By dissecting each of these attack paths, attendees will gain an understanding of how adversaries can infiltrate and compromise cloud infrastructures.

The presentation will also provide defensive strategies, including threat-hunting techniques using KQL to detect malicious behavior. Practical demonstrations will highlight the tools and methods used during cloud testing phases, such as AADInternals, TeamFiltration, SpiderFoot, and AzureHound. From gaining initial access to achieving full cloud takeover, this session equips attendees with the insights needed to recognize, mitigate, and defend against complex cloud threats.

12:00 - 1:00pm
I Will Survive: Protecting Backup and Recovery in the Age of Ransomware
Presented by Mike Owens
Ransomware attackers often target backups and recovery systems to force victims into paying ransoms, which makes robust protection strategies essential for organizations. Led by a remediation expert, this session outlines four(4) critical steps to safeguard backups, harden systems, and maintain recovery capabilities during worst-case data corruption or ransomware incidents. Participants will explore effective backup design and management, technical hardening measures, and the role of immutable backups to prevent tampering. Drawing on real-world attack and recovery scenarios, the session will guide attendees through practical recovery planning, self-assessment, prioritizing key investments, and the value of regular testing. With additional insights on integrating these strategies into broader organizational risk management, attendees will gain tools and techniques to become true ransomware survivors.

1:00 - 2:00pm
Lunch

2:00 - 3:00pm
Why You May Not Need a Security Team
Presented by Alex Hamerstone
This session challenges traditional notions of cybersecurity by proposing a decentralized approach where security responsibilities are embedded across various roles rather than being confined to a specialized team. By empowering staff such as developers and network administrators to integrate security practices into their work, supported by a governance and advisory framework, companies can foster greater security-mindedness and improve resilience. This shift requires rethinking the role of security, emphasizing oversight, risk management, and integration with broader business functions, while also acknowledging the changing landscape of privacy, legal, and audit responsibilities. The result is a more adaptive and effective security strategy, where all staff contribute to a proactive defense.

3:00 - 4:00pm
Decrypting the Chaos: An Attacker's Guide to Understanding Modern-Day Threats
Presented by Travis Kahn
In today’s cyber landscape, separating genuine threats from hype can be challenging. This session offers a critical insider's view to help organizations focus their cybersecurity defenses on the most pressing threats. Drawing on Red Team expertise, the session will reveal how attackers exploit weaknesses, highlighting key threats and common blind spots in security defenses. Attendees will gain actionable insights for enhancing logging, monitoring, and overall defensive strategies, learning how to prioritize resources and fine-tune detection methods to outpace adversaries. This session cuts through the noise and provides practical steps to build a clear and effective threat mitigation strategy.

4:00 - 5:00pm
Exploiting AI: A Case Study on Voice Biometric Penetration Testing
Presented by Skyler Tuter
This session will offer an in-depth case study on how AI voice cloning can compromise voice biometric authentication systems. Drawing from a recent engagement with a major financial institution, the presentation will showcase how advanced AI voice synthesis techniques were used to manipulate voice-based identity verification through Interactive Voice Response (IVR) systems. Attendees will gain a detailed understanding of the methodologies employed during penetration testing, the obstacles encountered, and key insights from successfully bypassing security measures with cloned voices. This talk will shed light on the vulnerabilities inherent in current voice authentication systems and provide practical recommendations for enhancing security.

5:00 - 6:00pm
Closing Keynote
Presented by David Kennedy