BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//2026//A8YSFX
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-DVMMTU@cfp.nsec.io
DTSTART;TZID=EST:20260514T103000
DTEND;TZID=EST:20260514T123000
DESCRIPTION:Command & Control (C2) is the backbone of modern offensive oper
 ations - and one of the most reliable detection opportunities for blue tea
 ms. \n\nThis hands-on workshop provides a unified view of C2 fundamentals 
 for both offensive and defensive practitioners. Using the open-source Myth
 ic framework\, participants will deploy agents\, handle callbacks\, execut
 e tasking with a focus on opsec\, and design real detection logic based on
  their own generated telemetry. \n\nThe session will also cover basic C2 i
 nfrastructure design including redirectors and domain fronting\, an overvi
 ew of Mythic agent feature sets\, and a high-level comparative analysis of
  major C2 frameworks used in industry today. Students should leave armed w
 ith practical introductory experience operating and detecting C2 activity 
 across multiple platforms.
DTSTAMP:20260507T203823Z
LOCATION:Workshop 1
SUMMARY:Command & Conquer: A hands-on C2 primer for aspiring Red & Blue tea
 mers - Logan MacLaren\, Lewis Moore
URL:https://cfp.nsec.io/2026/talk/DVMMTU/
END:VEVENT
END:VCALENDAR
