HOME
CHIBRRCON ’25
SPONSORS
PARTNERS
PRIOR EVENTS
POLICIES
CONTACT
ABOUT
ChiBrrCon
Where geeks gather to learn and grow
HOME
CHIBRRCON ’25
SPONSORS
PARTNERS
PRIOR EVENTS
POLICIES
CONTACT
ABOUT
ChiBrrCon 2024 Presentations
Home
ChiBrrCon 2024 Presentations
Table of Contents
Keynote
Your Security Program is a Horse's Ass - Ira Winkler
Artificial Intelligence
What's in your AI code? Learn why every SCA tool is wrong, and how to deal with it - Anand Sawant
Artificial Intelligence, Real Threats - Johnny X-Mas
Auto Generated Allies: Enlisting AI Support for Applied Cryptography - Pranshu Bajpai
Paste the pdf file link from setting widget.
Birthing Perjury-free AI - Charles Herring
Enterprise Engagement
Partnerships not Relationships: How to Effectively Distill Security into DevOps - Kyle Kurdziolek
The Role of Cyber Guardians: Leadership in Safeguarding the Digital Foundation - Brayden Santo
Employing a Strategic Approach to Managing Shared Supply Chain Risk - Arvin Verma
Fostering Risk Culture with a Cybersecurity Champions Network - Kyle Joerger
Paste the pdf file link from setting widget.
Geek Speak
Conti-nuum: Maximizing Threat Intel with the Conti Leak - Dan Banker
Paste the pdf file link from setting widget.
Fostering Risk Culture with a Cybersecurity Champions Network - Abby Dryer
Up Close & Personnel - Chris Carlis
Beyond the Clock: Decoding Timestomping - Abhishek Menon
Stand Up Straight - Security Posture And You - Dwayne McDaniel
Become a Super(hero) Computer – Encryption of the Future, Today - Abby Bick
Identity and Access Management
YOU are the reason your identity program is setup to fail - ギンジ🐾ターラノー
Deterring Cybercrime via a Global Cybergrid - Charles Herring
Secure Your Infrastructure with Cloud-Native PAM - Swapnil Pawar
Leadership
Getting It Done - project managing in a security world - Jezza Sutton
Leadership
Disruption Through Inclusion_ Cyber Security's Opportunity to Harness DEI - Jordan Quinn
Overcoming the Cyber Security Poverty Line - Robert Wagner