HackNWA Conference will take place on on Apr 19
th from 8am-5pm at the NWACC Peterson Auditorium in Bentonville, AR. This event will be the day before Sp4rkCon and provides a day full of talks from Cyber Security professionals with a focus primarily on offensive security topics. Topics will include Exploit Development for multiple architectures, low level assembly code primers, Operational Secruity, Social Engineering, Phone Phreaking, hardware hacking, and more.
Register now EventBrite registration page
https://www.eventbrite.com/e/hacknwa-conference-2024-dumpster-fire-express-tickets-855555699127
Location
Shewmaker Center For Global Business Development, 900 SE Eagle Way, Bentonville, AR 72712
Speakers
We have an amazing lineup of accepted speakers so far.
Rod Soto - Keynote
Rod has had a meaningful impact on the cyber security community by providing guidance and platforms for people to participate and learn. His background includes being a member of the Response teams at Akamai and Prolexic, running HackMiami, DEFCON Instructor and currently as Sr. Principal Security Researcher at Splunk.
Jimi Allee
With over 25 years in the Information Security industry, Jimi has successfully navigated through many roles within the Infosec landscape, including Network/System/Security Engineering, Threat Intel/Risk Analysis, Offensive Security, Red/Blue/Purple Teaming as well as Research & Development. A former member of the US National Video Game Team, Jimi's passionate curiosity brings a gamer mentality to the world of Threat Research, Detection and Elimination.
Michael Brown
Michael has many years of security consulting, leadership and architecture experience. Some of his roles have included Global IT Security Architect for Motorola Mobility, Manager and Sr. It Security Consultant for 24By7Security, fractional/vCISO consultancy capacity for various companies and more. He is also a contributor to the NIST Cyber Security Framework and ISSA Fellow.
Chris Williams
Chris is part of the HackNWA crew with a fascinating background. He grew up in New Jersery, he learned to code in assembler at 7yrs old and was writing and optimizing video games for his siblings. Later in life he held multiple director level roles such as Director of Network Operations at Interop Technologies, then CTO of Bernett Research before returning to more hands on keyboard roles before getting into the CTF circuit and writing his own shell code on the fly. Currently in the top 10 rankings on the National Cyber League, he has pwnd many a CTFs and is a top hacker.
Danil Karandin
Currently Lead Purple Team Engineer at Gartner, where he conducts Adversary Emulation Exercises, Continuous Security Validations, Pro-Active Penetration Tests, and builds the whole Purple Team initiative. Before that, he worked as a Senior Intrusion Analyst, SOC Shift Lead (backup), and a Custom Detections Lead at Walmart. He holds a Bachelor's degree in Information Security, a post-baccalaureate certificate in Pentest and Ethical Hacking, a Master’s in Information Security Engineering, and 10 SANS / GIAC certifications (GXPN, GCIA, GDSA, GPEN, GWAPT, GCIH, GSTRT, GSEC, SSAP, GCPM). He is constantly puruing self education and owns a small company called Discerning Security.
Richard Clark
Richard is one of our local hackers who has been on the scene since he was a kid. Counted among the few accepted into the ASMS program, he is a passionate speaker who you will not want to miss. He has held technical roles at Acxiom, Alltel, Verizon, FIS and other orgs.
Shannon Franklin
Shannon is part of the HackNWA crew and the creator of our ASMb1337 coding challenges. He was trained in the ways of the low level for his first career, coding OSD overlays and remote control systems in the Arkansas Delta when companies such as Sanyo and others were manufacturing TVs and electronics in state. He continues hardware hacking and the low level experience by coding video games, demo scenes and other interesting things for the 6502.
Villages / Exhibits
In order to achieve our hands on keyboard objectives for this event we will be providing a variety of villages and exhibits for people to get in on the action.
ASMb1337
Assembly coding village with a focus on 6502 architecture. Participants will have access to custom 6507 Atari game code, reference materials and developer SD card cartridges for testing and playing said games on Atari.
Some of the concepts that will be conveyed:
Basic ASM coding concepts
Level data arrangement in 6507 ASM
Byte Manipulation techniques
Music synthesis in the Atari graphics chips
Porting your to C64 emulator to continue at home
In addition, most people will not receive a full assmbled PCB badge. Instead you will receive a pack and can wear the unpopulated badge right away but we are sure you will want to enable power and activate blinky. Solder stations and adeptus mechanicus to assist you will be available to achieve this. We will also show off some low level embedded hardware probing and other exhibits.
Demos Track
More info coming
Conference Schedule
Track 1
Track 2
8:00am
8:00 - 17:00
Track: 2
HackNWA
8:30am
9:00am
9:00 - 10:00
Track: 1
HackNWA
10:00am
10:00 - 11:00
Track: 1
Michael Brown
11:00am
11:00 - 11:30
Track: 1
Richard Clark
11:30am
11:30 - 12:00
Track: 1
mACK
12:00pm
12:00 - 12:30
Track: 1
Shannon Franklin
12:30pm
12:30 - 13:00
Track: 1
TBA
1:00pm
13:00 - 14:00
Track: 1
Danil Karandin
2:00pm
14:00 - 15:00
Track: 1
Jimi2x
3:00pm
15:00 - 16:00
Track: 1
Chris Williams
4:00pm
16:00 - 17:00
Track: 1
Rod Soto