PancakesCon 6 occurred on September 21, 2025. It has now concluded. Thank you for attending! Recordings of talks will be available on our YouTube, starting approximately one month after the conference.
| All Times US Central – Chicago | Track 1 | Speaker | Track 2 | Speaker |
| 0600-0610 | OPENING REMARKS / TRANSITION FROM COMFYCON TEAM | Lesley Carhart | ——- | ——- |
| 0610-0700 | KEYNOTE 1 | Bruce Large | ——- | ——- |
| 0700-0740 | Good Cyberz for Small Business and Swimming is Life | Jodie Miners | Whoa, Black Basta (Bam Ba Lam) | Dan Banker |
| 0740-0820 | Medical Device Security and Misty Mountains of Victoria | Simon C | Know the Deck, Know the Threat: TTPs and Threat Intel through Magic the Gathering | John Stoner |
| 0820-0900 | SOC-in-the-Vbox and How Brush Lettering Taught Me to Sit | Mike Gonzalez | Getting OT Cyber Done 200 Miles from Shore / The Role of Charity Trustees | Rob Rothwell |
| 0900-0940 | PKI and Powerlifting! | Jake Hildreth / horse | Cyber Insurance and Spinning Yarn | Amanda / Tindra |
| 0940-1020 | What Hiking Taught Me About Building Privacy Programs | Amristar Wickramaratna | Structured Note-Taking for Effective Incident Response And Indonesia for the Solo Traveler | Daniel Suryanata |
| 1020-1100 | Domain Intelligence, Investigative Journalism, and the Importance of Play | Ian Campbell / Neurovagrant | Plan ahead: Reap Rewards: Cyber Planning and Pot Roast in the Slow Cooker | Dr. Meg Layton |
| 1100-1140 | Career Planning in an Era of Layoffs and Storygames | Dave Weinstein | Hacking the OSCP & the Practice of Zen Meditation | Keith Hoodlet |
| 1140-1220 | Patient Craftsmanship – Finding Malicious Users and Embroidery | Kris Hardy | A Primer on Windows Access Control & Creating a Compelling D&D Villain | WinterKnight |
| 1220-1300 | One-liners and One Needle: Bash and Needlebinding | Brianna / Dio9sys | Reverse Engineering Surveillance Infrastructure and Feeding Your Neighbors | Ryan O’Horo |
| 1300-1340 | From Terry to Telemetry, Security to Sweets: Doing What You Love | Micheal Cottingham | How Not to Do Security at a Startup and Being a Good Friend (and teammate) | Emily Gladstone Cole |
| 1340-1430 | KEYNOTE 2 | Alyssa Miller | ——- | ——- |
| 1430-1500 | CLOSING REMARKS / AWARDS | Lesley Carhart | ——- | ——- |