Sched.com Conference Mobile Apps
ChiBrrCon 2025
has ended
Create Your Own Event
ChiBrrCon 2025
ChiBrrCon V - 2025: Wizards and Warlocks
Show More
Sign up
or
Log in
to register for this event.
About
Schedule
Map
Speakers
Sponsors
Artists
Exhibitors
Search
Menu
About
Schedule
Map
Speakers
Sponsors
Artists
Exhibitors
Search
Event Schedule
My Schedule
0
View
Simple
Expanded
Grid
By Venue
Map
Simple
Expanded
Grid
By Venue
Map
Thursday
, February 13
↖️ Barbarian's Forge (Alumni Lounge)
10:15am •
Need for SOC Transformation
FULL
11:15am •
The Art of Balancing Security and Business Needs
FULL
1:15pm •
Zero Trust for All Ages: An Architect’s Guide to Business-centric Zero Trust Implementation
FULL
2:15pm •
Selling Security: Get the Resources you Need
FULL
3:15pm •
Not just IR-Calm in Chaos: Leading Through Crises in Security Organizations
FULL
↙️ Dragon's Den (Hermann Lounge)
10:15am •
Building Testing Dropboxes
FULL
11:15am •
Illuminating Transparency: The Evolution of SBOMs and Beyond
FULL
1:15pm •
Fireside Chat with Lynn Dohm, Executive Director of WiCyS
FULL
2:15pm •
Securing Code with Open-Source LLMs: Unleashing AI for Smarter AppSec
FULL
3:15pm •
Navigating the Growing Adoption of AI: Governing Risks with ISO 42001 (Artificial Intelligence Management System - AIMS)
FULL
⏪️ Alchemist's Lab (Ballroom)
10:15am •
The Bad Guys Are (Unfortunately) Talented Developers
LIMITED
11:15am •
IAM anti-patterns: hard lessons from real-world implementations
LIMITED
1:15pm •
Like a Hurricane: The Life and Times of Privileged Access Management (THE MOVIE)
LIMITED
2:15pm •
Case study in Vulnerabilities Management - Tales from the frontline
LIMITED
3:15pm •
Public Sector Career Panel
LIMITED
⏺️ Cleric's Temple (Auditorium)
9:00am •
Opening Ceremony
9:15am •
Keynote Presentation
10:15am •
Deciding Your Future: Techie or CISO? Let’s Break It Down
LIMITED
11:15am •
The Resilience Awakens: Tapping Into Your Inner Force for Mental Strength
LIMITED
1:15pm •
A Vulnerability Management Program - Be Prepared and Armed to Combat the Cyber Dragons!
LIMITED
2:15pm •
Revolutionizing Threat Modeling: The Power of AI Acceleration
LIMITED
3:15pm •
Hacking other teams, using social skills, to strengthen your IAM Program
LIMITED
4:15pm •
CISO Panel
5:00pm •
Closing Ceremony
➡️ Wizard's Tower (Expo)
10:15am •
Build Your Cybersecurity Program One Step at a Time
FILLING
11:15am •
Preparing for the Unexpected and Restoring Operational Functionality
LIMITED
1:15pm •
Prompt It Till You Make It: AI Co-Pilots for Security Growth
LIMITED
2:15pm •
Keep Momentum - how to survive long-running projects
LIMITED
3:15pm •
The Quiet Part Out Loud
LIMITED
⬆️ The Barracks (Field Room / Green Room)
1:15pm •
Lockpicking 101
FULL
2:00pm •
Lockpicking/Arduino/Crypto Puzzle Village
FULL
⬇️ The Duke's Garden - Vilage 1 (Gallery Lounge)
11:15am •
Hardware village: It's dangerous to go alone! Take this serial adapter.
⬇️ The Duke's Garden - Village 2 (Gallery Lounge)
10:10am •
Escape Room
FULL
10:40am •
Escape Room
FULL
11:10am •
Escape Room
FULL
11:40am •
Escape Room
FULL
1:10pm •
Escape Room
FULL
1:40pm •
Escape Room
FULL
2:10pm •
Escape Room
FULL
2:40pm •
Escape Room
FULL
3:10pm •
Escape Room
FULL
3:40pm •
Escape Room
FULL
⬇️ The Duke's Garden - Village 3 (Gallery Lounge)
10:15am •
Career Clinic Village
⬇️⤵️↩️ Domus Communis Scolae (HH-010)
11:30am •
Securing APIs: Understanding the 3 Pillars of API Security
FULL
👑 King's Banquet Hall (Main Lobby)
8:15am •
Check-In & Registration / Light Breakfast Buffet
12:00pm •
Lunch
5:00pm •
B-Sides (Social Gathering)
Filter By Venue
Hermann Hall Conference Center, South Federal Street, Chicago, IL, USA
All
↖️ Barbarian's Forge (Alumni Lounge)
↙️ Dragon's Den (Hermann Lounge)
⏪️ Alchemist's Lab (Ballroom)
⏺️ Cleric's Temple (Auditorium)
➡️ Wizard's Tower (Expo)
⬆️ The Barracks (Field Room / Green Room)
⬇️ The Duke's Garden - Vilage 1 (Gallery Lounge)
⬇️ The Duke's Garden - Village 2 (Gallery Lounge)
⬇️ The Duke's Garden - Village 3 (Gallery Lounge)
⬇️⤵️↩️ Domus Communis Scolae (HH-010)
👑 King's Banquet Hall (Main Lobby)
Filter By Type
Artificial Intelligence (Ai)
All
Offense & Defense
Business Continuity & Disaster Recovery
Career
DevSecOps
All
API Security
General
All
Dining
Keynote
Hardware Hacking
IAM
Identity and Access Management (IAM)
All
Privileged Access Management (PAM)
Incident Response (IR)
PenTesting & Red Teaming
All
Offense & Defense
Personal Wellness
All
Self-Help
Privacy
All
Data Protection
Security Operations (SecOps)
Security Program Management
All
Business Needs
GRC
Relationship Management
Third Party Risk Management
All
Supply Chain Management
Village
All
Control Systems & Puzzles
Hardware Hacking
Offense
Self-Help
physical Security
Vulnerability Management
Zero-Trust
Type of Session
Case Study
Class
Presentation
Village
Audience
All
Beginner to Intermediate testers
No programming skills necessary
Understanding of Penetration Testing Concepts
Subject
Defensive Security
General Information
Offensive Security
Area
Multi-Disciplinary Hacking
Physical Security Hacking
Popular
Share Modal
Share this link via
Or copy link
Copy
Filter sessions
Apply filters to sessions.
close
Dates
Thursday
, February 13
Session Type
Artificial Intelligence (Ai)
All
Offense & Defense
Business Continuity & Disaster Recovery
Career
DevSecOps
All
API Security
General
All
Dining
Keynote
Hardware Hacking
IAM
Identity and Access Management (IAM)
All
Privileged Access Management (PAM)
Incident Response (IR)
PenTesting & Red Teaming
All
Offense & Defense
Personal Wellness
All
Self-Help
Privacy
All
Data Protection
Security Operations (SecOps)
Security Program Management
All
Business Needs
GRC
Relationship Management
Third Party Risk Management
All
Supply Chain Management
Village
All
Control Systems & Puzzles
Hardware Hacking
Offense
Self-Help
physical Security
Vulnerability Management
Zero-Trust
Other Filters
Type of Session
Case Study
Class
Presentation
Village
Audience
All
Beginner to Intermediate testers
No programming skills necessary
Understanding of Penetration Testing Concepts
Subject
Defensive Security
General Information
Offensive Security
Area
Multi-Disciplinary Hacking
Physical Security Hacking
Popular