BSidesDayton 2026 Schedule

Conference Schedule

Check out the full lineup of talks, workshops, and villages across multiple tracks so you can plan your day and catch the sessions that matter most to you.

9:30 AM

Welcome and Keynote

Not yet announced.

10:00 AM

Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites

Annie Dai | 60 Minutes

A broad scan of cleartext IP traffic across dozens of GEO satellites shows how critical infrastructure backhaul is exposed and what that means for defenders.

11:00 AM

You've Probably Never Heard of the Reticulum Network

Guy Royse | 60 Minutes

Reticulum is a cryptography-based stack for resilient, decentralized communication when centralized infrastructure fails or gets cut off.

12:00 PM

Lunch

Not yet announced.

1:00 PM

These aren't the Providers you are looking for: Compromising pipelines with Evil Terraform

Dakota Riley | 60 Minutes

Malicious Terraform providers can steer CI pipelines and deepen access, with attack paths, mitigations, and a live demo.

2:00 PM

Definitely Not Secure (DNS)

Matt Scheurer | 60 Minutes

DNS fundamentals, live demos of common attacks, and practical defensive tactics for people who use DNS every day but rarely treat it as a primary attack surface.

3:00 PM

Presentation 5

Not yet announced.

4:00 PM

Presentation 6

Not yet announced.

5:00 PM

Closing Address

Not yet announced.

5:30 PM

After Party

Learn More

Join us after the conference at Wandering Griffin Brewery & Restaurant from 5:30 PM to 10:00 PM. Enjoy complimentary hors d'oeuvres and non-alcoholic drinks, and networking with fellow attendees.

10:00 AM

A typhoon of Problems | A short brief on Salt Typhoon's History and TTPs

Mason Herzner | 60 Minutes

Silk Typhoon history for blue team hunters, covering past campaigns, TTPs, exploits, and malware in a shorter format.

11:00 AM

Session 2

Not yet announced.

11:30 AM

Lunch

Not yet announced.

1:30 PM

Agentic AI Kill Chain

Martin Voelk | 30 Minutes

Enterprise AI agents in chat apps enable poisoned RAG, malicious link unfurling, and zero-click exfiltration, with guidance on how to test and defend.

2:00 PM

Session 4

Not yet announced.

2:30 PM

You guys are getting paid? A story of how I got into hardware hacking.

Jeremy Hong | 30 Minutes

A path from a Dayton local meetup into hardware hacking, plus where the tooling stands today.

3:00 PM

A Standard For Investigative Playbooks

Matthew Gracie | 60 Minutes

YAML investigation playbooks that tie alerts and artifacts to methodology and defensive tooling, with a demo in an open monitoring platform.

Call Center Village

Learn More

Explore the tools, platforms, and techniques behind modern voice-based social engineering, covering both AI-powered call agents and live human operators. Features The Escalation Desk CTF, The Learning Line demonstrations, The Demarcation Demo, and an interactive British-style phone booth.

Radio Village

Learn More

Explore the invisible world of wireless communication using software-defined radio, amateur radio, and other RF technologies, all with affordable hardware and free tools.

P25 Radio Village

Learn More

Explore APCO Project 25 radio systems through DVMProject demos, Raspberry Pi hotspots, live FNE infrastructure, and hands-on looks at encryption and key management on retired public-safety gear. Bring your radios!

Sticker Heist

Learn More

A story-driven cybersecurity heist where teams recon a protected safe, disable its defenses, and crack it open for the sticker loot without triggering the alarms.

Reactor Control Village

Learn More

Step into a hands-on power plant simulation where you monitor the system, experiment with control logic, and try to guide the plant through shutdown before it spirals into failure.