| SANS Holiday Hack Challenge: Welcome + Orientation | Ed Skoudis |  | 
| Automate security response by creating your own "Naughty Lists" | Andy Smith |  | 
| RFC-3514 Compliant Pentesting: Being Good While You're Being Bad | Tom Liston |  | 
| FPGA Design for Embedded Systems | Prof. Qwerty Petabyte |  | 
| Disclosing Security Vulnerabilities to OS Projects.. Like a Boss! | Nancy Gariché |  | 
| Kubernetes Attack Demo: Hacking a Cheating Casino | Jay Beale |  | 
| The Abominable Snowman's Threat Hunting Adventure | Xena Olsen |  | 
| A CISO's Best Friend: The Pentester!!?! | Sean Atkinson & Chris Elgee |  | 
| How to Build a Free Malware Lab | Mary Ellen Kennel |  | 
| Using Open-Source Tools to Track Elves | Clay Moody |  | 
| HIDden Duckey, Deconstructed Payload | Kevin Tyers |  | 
| Google, Eliminating XSS in Angular Applications | Bjarki Ágúst Guðmundsson |  | 
| Log4j Vulnerability Response | Prof. Qwerty Petabyte |  |