HackNWA Conference 2024


HackNWA Conference will take place on on Apr 19th from 8am-5pm at the NWACC Peterson Auditorium in Bentonville, AR. This event will be the day before Sp4rkCon and provides a day full of talks from Cyber Security professionals with a focus primarily on offensive security topics. Topics will include Exploit Development for multiple architectures, low level assembly code primers, Operational Secruity, Social Engineering, Phone Phreaking, hardware hacking, and more.

Register now EventBrite registration page
https://www.eventbrite.com/e/hacknwa-conference-2024-dumpster-fire-express-tickets-855555699127

Location

Shewmaker Center For Global Business Development, 900 SE Eagle Way, Bentonville, AR 72712


Speakers

We have an amazing lineup of accepted speakers so far.


Rod Soto - Keynote

Rod has had a meaningful impact on the cyber security community by providing guidance and platforms for people to participate and learn. His background includes being a member of the Response teams at Akamai and Prolexic, running HackMiami, DEFCON Instructor and currently as Sr. Principal Security Researcher at Splunk.

Jimi Allee

With over 25 years in the Information Security industry, Jimi has successfully navigated through many roles within the Infosec landscape, including Network/System/Security Engineering, Threat Intel/Risk Analysis, Offensive Security, Red/Blue/Purple Teaming as well as Research & Development. A former member of the US National Video Game Team, Jimi's passionate curiosity brings a gamer mentality to the world of Threat Research, Detection and Elimination.

Michael Brown

Michael has many years of security consulting, leadership and architecture experience. Some of his roles have included Global IT Security Architect for Motorola Mobility, Manager and Sr. It Security Consultant for 24By7Security, fractional/vCISO consultancy capacity for various companies and more. He is also a contributor to the NIST Cyber Security Framework and ISSA Fellow.

Chris Williams

Chris is part of the HackNWA crew with a fascinating background. He grew up in New Jersery, he learned to code in assembler at 7yrs old and was writing and optimizing video games for his siblings. Later in life he held multiple director level roles such as Director of Network Operations at Interop Technologies, then CTO of Bernett Research before returning to more hands on keyboard roles before getting into the CTF circuit and writing his own shell code on the fly. Currently in the top 10 rankings on the National Cyber League, he has pwnd many a CTFs and is a top hacker.

Danil Karandin

Currently Lead Purple Team Engineer at Gartner, where he conducts Adversary Emulation Exercises, Continuous Security Validations, Pro-Active Penetration Tests, and builds the whole Purple Team initiative. Before that, he worked as a Senior Intrusion Analyst, SOC Shift Lead (backup), and a Custom Detections Lead at Walmart. He holds a Bachelor's degree in Information Security, a post-baccalaureate certificate in Pentest and Ethical Hacking, a Master’s in Information Security Engineering, and 10 SANS / GIAC certifications (GXPN, GCIA, GDSA, GPEN, GWAPT, GCIH, GSTRT, GSEC, SSAP, GCPM). He is constantly puruing self education and owns a small company called Discerning Security.

Richard Clark

Richard is one of our local hackers who has been on the scene since he was a kid. Counted among the few accepted into the ASMS program, he is a passionate speaker who you will not want to miss. He has held technical roles at Acxiom, Alltel, Verizon, FIS and other orgs.

Shannon Franklin

Shannon is part of the HackNWA crew and the creator of our ASMb1337 coding challenges. He was trained in the ways of the low level for his first career, coding OSD overlays and remote control systems in the Arkansas Delta when companies such as Sanyo and others were manufacturing TVs and electronics in state. He continues hardware hacking and the low level experience by coding video games, demo scenes and other interesting things for the 6502.


Villages / Exhibits

In order to achieve our hands on keyboard objectives for this event we will be providing a variety of villages and exhibits for people to get in on the action.


ASMb1337

Assembly coding village with a focus on 6502 architecture. Participants will have access to custom 6507 Atari game code, reference materials and developer SD card cartridges for testing and playing said games on Atari.

Some of the concepts that will be conveyed:
Basic ASM coding concepts
Level data arrangement in 6507 ASM
Byte Manipulation techniques
Music synthesis in the Atari graphics chips
Porting your to C64 emulator to continue at home

In addition, most people will not receive a full assmbled PCB badge. Instead you will receive a pack and can wear the unpopulated badge right away but we are sure you will want to enable power and activate blinky. Solder stations and adeptus mechanicus to assist you will be available to achieve this. We will also show off some low level embedded hardware probing and other exhibits.

Demos Track

More info coming


Conference Schedule

8:00am

Registration

8:00 - 9:00 Track: 1

ASMbl1337

8:00 - 17:00 Track: 2 HackNWA

8:30am

9:00am

Openning Keynote

9:00 - 10:00 Track: 1 HackNWA

10:00am

AI Risk Modeling Framework

10:00 - 11:00 Track: 1 Michael Brown

11:00am

Phone Phreaking

11:00 - 11:30 Track: 1 Richard Clark

11:30am

Contain your OPSEC

11:30 - 12:00 Track: 1 mACK

12:00pm

ASMb1337

12:00 - 12:30 Track: 1 Shannon Franklin

12:30pm

TBA

12:30 - 13:00 Track: 1 TBA

1:00pm

How to Find Juicy SMB Shares Faster

13:00 - 14:00 Track: 1 Danil Karandin

2:00pm

TBA

14:00 - 15:00 Track: 1 Jimi2x

3:00pm

ARM and RISCv5 Binary Exploitation

15:00 - 16:00 Track: 1 Chris Williams

4:00pm

Ending Keynote

16:00 - 17:00 Track: 1 Rod Soto
Diamond Level Sponsors
Shirt Sponsors
Add-On Level Sponsors