2024 Conference Information

PancakesCon 5 occurred on 3/24/2024, and has now concluded. Recordings of talks are available on our YouTube, starting approximately one month after the conference.

Time (US Central)Track 1Track 1 SpeakerTrack 2Track 2 Speaker
0850-0900OPENING REMARKSLesley Carhart——-——-
0900-0945KEYNOTE – Getting the Right Rotation: Safe Locks and Sushi RollsDeviant Ollam——-——-
0945-1030Tabletops: An intro to Incident Readiness and D&DRoss Flynn (C0uns3l0r)Semiotics: Judging a book by its cover, security editionRebecca ‘Bex’ Markwick
1030-1115Creating an Incident Response toolkit and Learning a Foreign LanguageDuane Dunston / gnugroHow to Defeat Google Using KarateChris Plummer
1115-1200The Craft of Threat IntelligenceDarkHorseAPI Security and Household WiringJason Kent / %00Handle
1200-1245MITRE ATT&CK Mapping and The World’s Best MuffinsBill BatchelorApplied Cryptography: Certificates Pre- and Post- Quantum Computing and Cookbooks as cultural storytellersKarina Sirota Goodley
1245-1330Getting Started in ICS/OT Cybersecurity & Trashy Reality TV AppreciationMike Holcomb / UtilSecFlying High: Kites, the Cloud, and Privilege EscalationCasey Knerr
1330-1415Under the hood of SAST (how static code scanning works) and the evolution of women’s pro hockeyJulie DavilaOffline Password Cracking + Training Your Cat to do TricksRachael Lininger
1415-1500Using AI in Infosec — and birding!Sean / thepacketratDefault to Async – Prevent DoS Attacks on your App and your DayAllon Mureinik
1500-1545A Gentle Intro to Container Escapes and No-Clump GravyNatalie Somersall ‘some-natalie’Observability – secure your software supply chain & Running an eventNicole “CircuitSwan” Schwartz
1545-1630Stopping botnets with astrophysicsMike MoranHow to Combat M365 Account Takeovers (while you’re not out Thru-Hiking the Appalachian Trail)Matt Kiely
1630-1715Runbooks and Body BuildingKasturi PuramwarThrive or Survive : What a life in the Mosh Pit taught me about Cyber SecurityGeorge Sandford
1715-1800Launching Your Cybersecurity Career from Non-Traditional Backgrounds AND Getting Started Writing Young Adult Fantasy NovelsKevin E. JacksonWarding off Macavity through threat modelingDaniëlle / Dany
1800-1845The Business Value of Cybersecurity, and How Pilots Get From Place to PlaceJosh MasonPentesting and Personal Finance: Wisdom I Wish I Had Earlier In LifeGraham Helton
1845-1900CLOSING REMARKS / AWARDSLesley Carhart——-——-