SZ-Con-blue.png
  • May 25 - 27
  • 12:00 p.m. - 4:00 p.m. ET
  • Virtual

Source Zero Con brings the technical community together to educate future security leaders. This virtual event focuses on tactics and techniques in offensive and defensive security and allows you to virtually connect with peers and technical experts to explore new security concepts and capabilities through presentations and interactive workshops. Ranging from beginner to advanced sessions, our Source Zero research and innovation team will provide in-depth education to the technical community from practices including Attack and Penetration, Application Security, Digital Forensics, and Incident Response.

What You Can Expect

Learn Industry Insights

Connect with Technical Peers

Earn CPE Credits

Meet the Source Zero Con Planning Committee

Curtis Fechner.2.jpg

Curtis Fechner

Engineering Fellow - Enterprise Incident Management


Misty Hale.jpg

Misty Hale

Sr. Project Manager


Jess Hires.png

Jess Hires

Technical Manager - Attack & Penetration
Savannah Lazzara.jpg

Savannah Lazzara

Security Consultant - Attack & Penetration

Brian Payne.jpeg

Brian Payne

Technical Manager - Enterprise Incident Management

billyoung.jpg

Bill Young

Vice President, Threat


Tuesday, May 25

      • 12:00 p.m. - 1:00 p.m. ET

        Opening Keynote - Large Scale Multi-Party Vulnerability Disclosure Challenges

      • 1:00 p.m. - 1:45 p.m. ET

        Cloud Pen Test 101

      • 1:00 p.m. - 2:00 p.m. ET

        Remaining Invisible in the Age of EDR

      • 1:00 p.m. - 2:00 p.m. ET

        Using Threat Intelligence to Get Ahead of Ransomware Attacks

      • 1:45 p.m. - 2:30 p.m. ET

        Intro to Burp Suite

      • 2:00 p.m. - 3:00 p.m. ET

        Reversing Automotive 8051

      • 2:00 p.m. - 3:00 p.m. ET

        Top Threat Actors and How They Operate

      • 2:30 p.m. - 3:15 p.m. ET

        Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats

      • 3:00 p.m. - 4:00 p.m. ET

        Acceleration Vulnerability Remediation with Automation

      • 3:00 p.m. - 4:00 p.m. ET

        Cloud Threat Report: The COVID-19 Conundrum - Technical Deepdive

      • 3:15 p.m. - 4:00 p.m. ET

        Open Source Forensic Threat Hunting

Wednesday, May 26

  • 12:00 p.m. - 12:45 p.m. ET

    OSINT: Discovery and Profiling for Pentesters

  • 12:00 p.m. - 1:00 p.m. ET

    Practical Password Guessing (WORKSHOP)

  • 12:00 p.m. - 1:00 p.m. ET

    The Truth Is Out There: Mission-Critical SAP Applications Are Under Attack

  • 12:45 p.m. - 1:30 p.m. ET

    GraphQL Vulnerabilities

  • 1:00 p.m. - 2:00 p.m. ET

    Leveling Up Your Phishing Game on Modern Platforms

  • 1:00 p.m. - 2:00 p.m. ET

    Empower Your Developers To Scale AppSec in the Cloud Era

  • 1:30 p.m. - 2:15 p.m. ET

    Rethink Remediation - Linear vs Lifecycle

  • 2:00 p.m. - 3:00 p.m. ET

    The Evolution of Cloud Forensics and Incident Response

  • 2:00 p.m. - 3:00 p.m. ET

    Analyzing Phishing Documents 101 with HTB

  • 2:15 p.m. - 3:00 p.m. ET

    Legacy Attack Surface in the Modern Enterprise

  • 3:00 p.m. - 4:00 p.m. ET

    Get Off My wLAN: Hacking Wireless Networks

  • 3:00 p.m. - 4:00 p.m. ET

    Deep Dive into Android Static Analysis and Exploitation

  • 3:00 p.m. - 4:00 p.m. ET

    So you want to be a Threat? (Breaking into the Industry)

Thursday, May 27

  • 12:00 p.m. - 12:45 p.m. ET

    Security Impact of Rapid Growth of IoT (Internet of Things)

  • 12:00 p.m. - 1:00 p.m. ET

    Purple Teaming Inside-Out

  • 12:00 p.m. - 1:00 p.m. ET

    Would Your Organization Fail the Active Directory Security Assessment?

  • 12:45 p.m. - 1:30 p.m. ET

    Is Your Application Sending Email as Securely as Possible?

  • 1:00 p.m. - 2:00 p.m. ET

    Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data

  • 1:00 p.m. - 2:00 p.m. ET

    Blockchain Security - Lessons Learned and the Future State

  • 1:30 p.m. - 2:15 p.m. ET

    Detection of ScareCrow/EDR Bypass Payloads

  • 2:00 p.m. - 3:00 p.m. ET

    MDM The Blindspot You Didn't Know

  • 2:00 p.m. - 3:00 p.m. ET

    Perils of SaaS Collaboration - Where are the data and who has access?

  • 2:15 p.m. - 3:00 p.m. ET

    Phone-Pretexting - Mastering Social Engineering Savior-Faire 

  • 3:00 p.m. - 4:00 p.m. ET

    Closing Keynote - No More Breaches: Protecting Your Cloud Infrastructure

Speaking Sponsors

Marketo-Reversed_AppOmni_175x65 UPDATED.png
EM-Reversed_Crowdstrike_175x65.png
HackTheBox_Marketo-Reversed_EM.png
EM-Reversed_Onapsis_175x65.png
EM-Reversed_Palo-Alto-Networks_175x65.png
EM-Reversed_Proofpoint_175x65.png
LP-Reversed_Semperis_150x56.png
EM-Reversed_Snyk_175x65.png
ValidNetwork_Marketo-Reversed_EM.png

Register for Source Zero Con