Agenda

This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and epic security practitioners that will leave you amazed and frightened at the same time. By pulling back the curtain and giving you access into the mind of a hacker, you will better understand how to protect your networks and critical data.

Monday

05.18.2026

MORNING

7:30 – 8:50 am

Registration & Morning Networking

Location: Conference Center
AV Sponsor: Depth Security
Ruby Room Sponsor: Semperis

8:50 – 9:00 am

Welcome & Opening Remarks

Location: Main Ballroom
CTF Sponsor: Enterprise KC
Speaker: Gregory Carpenter, DrPH, FRSA

9:00 – 10:00 am

Opening Keynote

Location: Main Ballroom
Speaker: Winn Schwartau
Presentation Title:

Cognitive Defense in Three Steps: TMI-Noise, Critical Ignoring & Bullshit

Approximately 50,000 years ago, six distinct species of hominins competed for survival on the planet. We, the homo sapiens, won due to our superior innate primal toolkit to defend against the real-world physical existential threats of the day.

Fast forward through the millennia: writing, the printing press, the telegraph, the telephone, the radio, TV, and now the Internet. Our species is not hard-wired to defend against TMI, Too Much Information, algorithmic control, or a silicon-based ‘intelligence’ permeating the fabric of our existence: AI. We must evolve to coexist.

In today’s always-on, hyper-connected world, information isn’t just abundant—it’s overwhelming. As cybersecurity professionals, intelligence analysts, and critical thinkers, we take pride in detecting manipulation, filtering misinformation, and identifying deception. But here’s the uncomfortable truth: even the most informed minds fall prey to disinformation—not because they lack knowledge, but because they have too much of it. In cybersecurity, we call this DOS and DDoS; in cognitive security, we call it TMI, and are debilitating to both silicon- and carbon-based systems.

This incredible session delves into a crucial but often overlooked skill: Critical Ignoring—the ability to actively and strategically filter out irrelevant, manipulative, or deceptive information, much like modern cybersecurity tools eliminate much of the useless content floating on the Internet. While cognitive security has traditionally focused on detecting falsehoods, Critical Ignoring is about knowing what not to engage with in the first place. It’s about mental triage warfare and putting the brakes on TMI in an era of cognitive conflict.

10:00 – 10:30 am

Networking Break

Location: Foyer / Overflow
Sponsors • Coffee • Conversation • CTF

10:30 – 11:15 am

Technical Session

Location: Main Ballroom
Speaker: Aamir Lakhani
Presentation Title:

Ghost in the Shell: Prompts to Playbooks for Building & Breaking

Generative AI has democratized script kiddie capabilities, but the real threat isn’t a chatbot writing bad malware—it’s agentic autonomy. The next evolution of offensive security is not about asking an LLM to write an exploit; it is about deploying autonomous agents that can plan, execute, debug, and pivot through a network without human intervention. We have moved from “prompt engineering” to “agent engineering,” and the implications for Red Teaming are catastrophic.

Key Takeaways

· Learn how attackers are designing an agent-assisted workflow that increases throughputwhile remaining bounded by ethical or non-ethical scopes, and defensible auditability.

· Build an evaluation harness to measure agent reliability (task success, error modes, drift) andprevent silent regressions or “creative” overreach.

· Identify detection opportunities for agent-driven activity using telemetry (tool calls, endpointprocess trees, network sequencing), not brittle text classifiers.

11:15 – 12:00 pm

Technical Session

Location: Main Ballroom
Speaker: Valerie Thomas
Presentation Title:

Physical Security: The Good, Bad & Ugly

Within adversarial tradecraft, physical access represents the highest-value objective. Organizations deploy advanced physical access control systems (PACS) to mitigate this risk; however, these systems are frequently misconfigured and underutilized. In some cases, configuration weaknesses can negate multi-million-dollar investments, effectively enabling attackers to bypass or evade traditional detection mechanisms. This session delivers a baseline understanding of conventional physical security architectures, demonstrates current attack techniques, and outlines a practical roadmap for hardening deployed environments.

AFTERNOON

12:00 – 1:30 pm

Lunch & Networking Break

Location: Main Conference Room & Foyer / Overflow
Sponsored by: Enterprise KC
Meal • Sponsors • Networking • CTF

1:30 – 2:15 pm

Technical Session

Location: Main Ballroom
Speaker: Johnny Xmas
Presentation Title:

SOS (Same Old Shit): 5 Things You’re Still Doing Wrong

Abstract: Nearly 10 years ago Johnny quit full-time penetration testing out of shear boredom. The repetitive nature of finding the same systemic problems at company after company made the gigs not only a cure for insomnia , but also exceptionally frustrating to someone who cares deeply about security.

Now he’s back, and wow is he pissed about what he found. Join him as he rants about the biggest(and most actionable) things Large Enterprises are **still** doing wrong from a synersecurotyperspective, and presents basic frameworks for fixing them.

2:15 – 3:00 pm

Technical Session

Location: Main Ballroom
Speaker: Bryan Fite
Presentation Title:

P0wning the Narrative: How I Altered Reality

Why Compelling Stories Are More Important than Objective Truth

In an era where information is weaponized, understanding the dynamics of cognitive warfare, misinformation, and disinformation is crucial for security professionals.

This presentation delves into the evolution of these threats, highlighting their roots andexamining current trends. We will explore how AI and deepfake technologies are reshaping thelandscape, creating new challenges for cybersecurity.

Attendees will gain insights into the strategies employed by threat actors and the implications forglobal security. The session will also provide actionable recommendations for developing robustdefenses against these pervasive threats..

3:00 – 3:30 pm

Afternoon Networking Break

Location: Foyer / Overflow
Sponsors • Refreshments • Demos • CTF

3:30 – 4:15 pm

Technical Session

Location: Main Ballroom
Speaker: Cathy Ullman
Presentation Title: 

Defending Beyond Defense

Assumptions burn defenders every day. Perhaps the most pernicious one is that systems and their controls will always work as designed. Best practices in security may be good guidelines, but unfortunately also suffer from these same blind spots. For example, best practice recommends the use of LAPS for local administrator account passwords of domain-joined computers, yet misconfiguration of active directory can turn it from a protective control into a vulnerability. But what if there was a way to challenge these assumptions up front? The best way to dismantle these types of assumptions is to experience how deeply flawed they are. There is no better way to gain first hand experience into this perspective than immersion in the offensive security space. In this talk we’ll explore how to immerse yourself in the offensive security world to obtain this knowledge without needing to change careers or obtain additional certifications. By being more informed about offensive security, defenders are better able to recognize relevant intel, understand existing threats, and more readily discover attacker behavior. Join me as I discuss how there’s more to defending than just defense, and how you can find and engage with the amazing resources that are out there waiting to be explored..

4:15 – 5:15 pm

Closing Keynote

Location: Main Ballroom
Speaker: Len Noe
Presentation Title: 

Humanity 2.0

Len Noe, Transhuman, Former Outlaw, Cybersecurity Thought Leader

We are no longer standing at the edge of the future.

We are living inside it. Artificial intelligence, machine learning, and autonomous systems are reshaping power, labor, warfare, and identity. In a hyperconnected world where algorithms move faster than governments and data defines influence, humanity faces a defining question. Do we remain passive users of technology, or do we become active participants in our own evolution?

Humanity 2.0 explores human augmentation as a path to maintaining sovereignty and relevance in an era increasingly dominated by intelligent machines. From implanted microchips and bio integrated security systems to brain computer interfaces and cognitive enhancement, this talk examines the convergence of biology and technology not as science fiction, but as an emerging reality.

But augmentation without governance becomes vulnerability.

As we integrate technology deeper into the human condition, a new frontier of risk emerges. Neural privacy. When thoughts, biometrics, and cognitive patterns become data streams, who owns the mind? Who secures it? What happens when the last domain of human sovereignty, the brain, becomes hackable?

Drawing from lived experience at the intersection of cybersecurity, transhumanism, and digital ethics, Len Noe challenges audiences to rethink security beyond networks and endpoints. The next perimeter is the human nervous system.

Humanity 2.0 is not about replacing humanity. It is about strengthening it.

The future will not simply be artificial. It will be augmented.

5:15 – 7:30 pm

Happy Hour Reception

Theme:
World Cup KC: Defending the Goal

In InfoSec, the Match Never Ends.
Location: Poolside (weather permitting) or Foyer / Overflow
Drinks • Appetizers • Networking • FUN

A Roaring Red Production