Author: rvasadmin

RVAsec 15 Registration Now Open!

Tickets for RVAsec 15 are now on sale!

Registration for the RVAsec 15 security conference, located in Richmond, Virginia, is only $275 (to start) for two full days of talks, meals, snacks, drinks, reception, after party, prizes, a capture the flag contest, t-shirt & swag!

Once we sell out there will be no more tickets available and we do not have tickets for purchase at the door. Please help us ensure smooth planning with timely ticket purchases, and guarantee your spot at the conference.

Conference ticket prices and deadlines:**

  • $275 special price for the first 100 tickets!
  • $325 early price until 2/28
  • $400 regular registration until 3/31
  • $475 late registration 4/30
  • $550 super late registration 5/31
  • $650 absurd late registration until 6/5 or until tickets sell out

We also again have the RVAsec Marriott Hotel Package available until 5/29! The conference + Marriott hotel package is $650 and includes:

  • Two night’s stay at the Richmond Marriott Downtown (6/8 and 6/9), including taxes+fees (card needed at check-in for incidentals)
  • RVAsec conference admission
  • Custom Hack.RVA Electronic badge (the only way to guarantee one of the limited badges)
  • T-Shirt
  • Bag
  • Meals & snacks
  • Events

** If you are unable to attend due to the price, please contact us to discuss as we have stipends available for students, and we have a volunteer opportunities that provide a great way to get in for free!

Once again there will be no tickets sold at the door–and RVAsec has sold out every year–don’t wait!  We are unable to provide refunds due to processing fees. You can, however, easily transfer your ticket to another person.

Register now!


RVAsec 15 CFP is now open!

Click here to submit a talk to the CFP!

The call for papers for RVAsec 15 is now open!

RVAsec 15: June 9-10, 2026

CFP Submission Deadline:  March 22, 2026 at 11:59 PM Eastern


RVAsec is a Richmond, VA based security convention that brings top industry speakers to the midatlantic region. Last year, RVAsec attracted over 900 security professionals from across the country. For 2026, the conference is a two day and three track format, with a mixed focus on technical, management/business and 101 presentations.

Information:

  • Conference location: Richmond, VA
  • Dates: June 9-10, 2026
  • All talks must be 50 minutes in length
  • Presenters will need to select Technical, Business/Management, or 101 tracks.
  • While we welcome foreign speakers, we are unable provide sponsorship for entry to the U.S.

The following types of presentations will not be accepted:

  • Sales or marketing for companies or products
  • CFP submissions from in-house or agency PR/marketing professionals
  • Talks which do not offer new insight or perspective

RVAsec will hold no copyright on presentation content, but all speakers will be required to provide approval to post slides and video recordings of the talk on the RVAsec or other web sites.


Speaker Perks

  • Free admission to RVAsec
  • Invitation to the RVAsec speaker dinner/party
  • RVAsec T-shirt, badge & attendee swag bag
  • One 50% off pass for a friend or co-worker
  • Fame and glory, internet style!
  • Opportunity to be the recipient of the RVAsec “STFU” sign

For more information and requirements, or to submit, please visit: https://cfp.rvasec.com/

Click here to submit a talk to the CFP!


Hack Hunger

DONATE

Alright folks, this holiday season we’re proud to share our love with Feed More in their fight against hunger.

RVA.js has thrown the gauntlet down & RVAsec is joining them and other RVA tech groups and challenging our members to patch the hunger bug.

Whether you’re a hacker, auditor, sys admin, cyber marketer, recruiter, or just a security nerd like most of us, you can probably spare a few bucks to feed a family. So lets show the other Richmond tech groups the cyber security folks mean business. In the immortal words of Crash Override–FEED THE PLANET!

$10 = 40 meals. That’s a better ROI than any bug bounty, pentest, AI jailbreak, or Big Four report, and feels a whole lot more satisfying.

>> CLICK now and DONATE before that next meeting <<

Feed the Planet!


RVAsec 14 Video: David Young – It’s Not All Ninjas and Anonymous Masks

RVAsec 2025 Video: David Young
Security Consultant – Secure Ideas

Title: It’s Not All Ninjas and Anonymous Masks
In this talk, I’ll give you an insider’s look at what the day-to-day reality of working in cybersecurity really entails. We’ll dive into the typical tasks you’ll face, from scoping and executing the test to long-term security strategy. I’ll also share how to bridge the gap between technical jargon and business language, making complex concepts understandable for non-technical stakeholders. Of course, we can’t forget about reporting—a crucial yet often challenging part of the job. I’ll discuss the complexities of crafting reports that not only communicate risks but also drive action. Along the way, we’ll touch on the unique challenges posed by timelines and the tools we rely on. What makes this talk unique is my perspective from both sides of the fence: working on an internal team and as a consultant. This experience allows me to highlight the key differences and offer insights into how each role shapes your approach to cybersecurity.


RVAsec 14 Video: Vennard Wright – Leveraging AI in Surveillance for Public Safety Amid Privacy Concerns

RVAsec 2025 Video: Vennard Wright
CEO – PerVista AI

Title: Leveraging AI in Surveillance for Public Safety Amid Privacy Concerns
During this session, we’ll explore the dual-edged role of artificial intelligence (AI) in enhancing public safety through surveillance while navigating the complex landscape of privacy and legislation. As AI transforms law enforcement and emergency responses with its advanced monitoring and threat detection capabilities, it also prompts critical questions about privacy rights and ethical considerations. This talk will dissect the balance between leveraging cutting-edge AI technologies and adhering to evolving privacy laws. We’ll delve into the latest trends, discuss the implications of facial recognition and behavior prediction, and examine how legislation is adapting to these rapid technological advancements. Whether you’re a tech professional, policy maker, or privacy advocate, this session will equip you with the insights needed to responsibly implement AI in surveillance, ensuring public safety enhancements do not compromise individual privacy.


RVAsec 14 Video: Jon Waldman – Vendor Management 2025 – How to Make Better Vendor Management Decisions

RVAsec 2025 Video: Jon Waldman
President and Partner – SBS CyberSecurity

Title: Vendor Management 2025 – How to Make Better Vendor Management Decisions
Although vendor management has evolved, the core process remains the same: gathering and reviewing documentation to decide whether to continue business with a vendor. The key question now is how to ensure that vendors are genuinely protecting your datal


RVAsec 14 Video: Justin Varner – Oh Hotel No!: How A Helpless Hooligan Helped A Homie From Homelessness To Homeownership In 9 Months

RVAsec 2025 Video: Justin Varner
Chief of Innovation – RadZen Inc

Title: Oh Hotel No!: How A Helpless Hooligan Helped A Homie From Homelessness To Homeownership In 9 Months
This is the story of a hooligan and his fascination with exploiting physical and digital vulnerabilities in hotels for the purposes of persistent access, living off the land, and surreptitiously housing homeless people.


RVAsec 14 Video: Bobby N. Turnage, Jr. – Data Breach Management and Legal Issues for Information Technology Professionals

RVAsec 2025 Video: Bobby N. Turnage, Jr.
Attorney & Cybersecurity and Technology Team Leader – Sands Anderson PC

Title: Data Breach Management and Legal Issues for Information Technology Professionals
Please join us for a practical discussion (without the legalese!) about data breach management and minimizing the risk to your organization. In this discussion, we’ll talk through what it’s like to be in a breach situation, and we’ll cover some practical and legal considerations and suggestions that will help your organization achieve a better outcome.
Learning Objectives:

  1. Gain a better understanding of what it’s like to be in a data breach situation.
  2. Increase awareness of risks to your organization.
  3. Increase awareness of the various people and workstreams involved in working through a data breach
  4. Increase knowledge of proactive measures to improve the outcome and minimize risk to the organization.

RVAsec 14 Video: Morgan Stuart – Large Language Models for Hackers

RVAsec 2025 Video: Morgan Stuart
Data Scientist and Engineer – Canopy Nine, LLC

Title: Large Language Models for Hackers
Wield your own AI agents, for fun and profit, with open-weight Large Language Models. In this talk, the audience will learn the foundational data science that empowers LLMs to help…and hallucinate, before diving into a tutorial on “agentic” LLM techniques. Along the way, key concepts and methods are related to NIST’s AI Risk Management Framework (NIST AI 600-1) and their adversarial machine learning taxonomy (NIST AI 100-2e2023). Cut through the hype – see the limitations and attack surfaces for yourself, and explore ways you could incorporate these tools into your own practice.


RVAsec 14 Video: John Stoner – Defending Entra ID and Office 365 Using the Prism of GraphRunner

RVAsec 2025 Video: John Stoner
Security Strategist – Google Cloud

Title: Defending Entra ID and Office 365 Using the Prism of GraphRunner
For organizations using Microsoft Entra ID and O365, it’s important to understand the landscape of the Graph API, how data is accessed and the logs available to gain visibility into probes and attacks that are targeting users and their information stores.

To drive this awareness, I’ve chosen to use a red team toolkit called GraphRunner that empowers offensive cyber practitioners an easy to use method to get started probing Microsoft Entra ID and Office 365 tenants. On the flip side of this, we are going to take a look at the logs generated by GraphRunner in a simulated attack chain to better understand what a blue teamer might see and how they can build detections and hunt, not just for GraphRunner, but for suspicious activities occurring within their Entra ID and Office 365 tenant.