RVAsec 14 Video: Morgan Stuart – Large Language Models for Hackers

RVAsec 2025 Video: Morgan Stuart
Data Scientist and Engineer – Canopy Nine, LLC

Title: Large Language Models for Hackers
Wield your own AI agents, for fun and profit, with open-weight Large Language Models. In this talk, the audience will learn the foundational data science that empowers LLMs to help…and hallucinate, before diving into a tutorial on “agentic” LLM techniques. Along the way, key concepts and methods are related to NIST’s AI Risk Management Framework (NIST AI 600-1) and their adversarial machine learning taxonomy (NIST AI 100-2e2023). Cut through the hype – see the limitations and attack surfaces for yourself, and explore ways you could incorporate these tools into your own practice.


RVAsec 14 Video: John Stoner – Defending Entra ID and Office 365 Using the Prism of GraphRunner

RVAsec 2025 Video: John Stoner
Security Strategist – Google Cloud

Title: Defending Entra ID and Office 365 Using the Prism of GraphRunner
For organizations using Microsoft Entra ID and O365, it’s important to understand the landscape of the Graph API, how data is accessed and the logs available to gain visibility into probes and attacks that are targeting users and their information stores.

To drive this awareness, I’ve chosen to use a red team toolkit called GraphRunner that empowers offensive cyber practitioners an easy to use method to get started probing Microsoft Entra ID and Office 365 tenants. On the flip side of this, we are going to take a look at the logs generated by GraphRunner in a simulated attack chain to better understand what a blue teamer might see and how they can build detections and hunt, not just for GraphRunner, but for suspicious activities occurring within their Entra ID and Office 365 tenant.


RVAsec 14 Video: Michael Roytman – Cybersecurity is Ready for Local Models

RVAsec 2025 Video: Michael Roytman
Co-Founder, CTO – Empirical Security

Title: Cybersecurity is Ready for Local Models
This talk explores how a custom, local AI/ML model can be built internally at an enteprise for cybersecurity decision support. We’ll walk through data, methods, and pitfalls of building your own models rather than using off the shelf or vendor solutions.


RVAsec 14 Video: Nicholas Popovich – Attacking & Defending ServiceNow: A Hands-on Lab for Red & Blue Teams

RVAsec 2025 Video: Nicholas Popovich
Principal – Rotas Security

Title: Attacking & Defending ServiceNow: A Hands-on Lab for Red & Blue Teams
ServiceNow is a critical enterprise platform, often integrated with sensitive systems and privileged access. This talk explores how attackers can exploit misconfigurations and privilege escalation paths within ServiceNow to gain a foothold in an environment. We’ll walk through real-world attack techniques, from initial access to lateral movement, and demonstrate how defenders can detect and mitigate these threats.

In addition to offensive tradecraft, we’ll cover how to set up a dedicated lab to safely test these attack vectors, fine-tune detections, and improve defensive strategies. Whether you’re a red teamer looking to sharpen your tactics or a blue teamer aiming to strengthen your defenses, this talk will provide actionable insights and practical steps for securing ServiceNow.


RVAsec 14 Video: Alain Petit – Key Management and Basic Key Usage for Encryption 101

RVAsec 2025 Video: Alain Petit
Cyber Security Architect – Capital One

Title: Key Management and Basic Key Usage for Encryption 101
raise your awareness of cybersecurity encryption with a simple analogy: house keys. This presentation breaks down key management and encryption basics, from creation to destruction, using relatable examples.


RVAsec 14 Video: Qasim Ijaz – What the Scope? Sh** my Consultant | Client Says

RVAsec 2025 Video: Qasim Ijaz
Director of Cybersecurity – Aveanna Healthcare

Title: What the Scope? Sh** my Consultant | Client Says
Scoping a penetration test shouldn’t feel like negotiating a hostage situation—but here we are. In this engaging, no-holds-barred session, two seasoned cybersecurity professionals take the stage in a hilarious and painfully relatable discussion, showcasing the absurd, frustrating, and all-too-common conversations between consultants and clients.

Expect real stories, plenty of laughs, and insights that will make you rethink how you approach penetration testing and security assessments. Whether you’re a consultant, security leader, or someone who’s just tired of hearing “We don’t need a pentest”, this talk is for you.


RVAsec 14 Video: Luke McOmie – What the Scope? Sh** my Consultant | Client Says

RVAsec 2025 Video: Luke McOmie
VP Offensive Security – Blue Bastion

Title: What the Scope? Sh** my Consultant | Client Says
Scoping a penetration test shouldn’t feel like negotiating a hostage situation—but here we are. In this engaging, no-holds-barred session, two seasoned cybersecurity professionals take the stage in a hilarious and painfully relatable discussion, showcasing the absurd, frustrating, and all-too-common conversations between consultants and clients.

Expect real stories, plenty of laughs, and insights that will make you rethink how you approach penetration testing and security assessments. Whether you’re a consultant, security leader, or someone who’s just tired of hearing “We don’t need a pentest”, this talk is for you.


RVAsec 14 Video: Kevin Massey – Linux Kernel Exploitation for Beginners

RVAsec 2025 Video: Kevin Massey
IT Engineering Manager – Winebow

Title: Linux Kernel Exploitation for Beginners
My talk is focused on teaching people how to get into Linux kernel exploitation using Kernel based CTFs as an entry point.


RVAsec 14 Video: Kyle King – AI: Who’s watching whom?

RVAsec 2025 Video: Kyle King
Security Engineering Manager – Check Point Software Technologies Ltd.

Title: AI: Who’s watching whom?
Artificial Intelligence (AI) has intersected with cybercrime and cybersecurity that forces organizations to leverage the technology in order to benefit the industry while at the same time understanding how to protect against AI based threats. How will your organization use AI safely and securely?


RVAsec 14 Video: Christina Johns – Look Ma, No IDA! Malware Analysis Without Reverse Engineering

RVAsec 2025 Video: Christina Johns
Principal Malware Analyst – Red Canary

Title: Look Ma, No IDA! Malware Analysis Without Reverse Engineering
Do you think malware analysis is out of your reach because assembly code looks like reading the matrix? Fear not, this talk will convince you that learning assembly code is not the best place to start your malware analysis journey. For starters, the modern malware landscape is diverse and malicious code isn’t always compiled into assembly. Not every use case for malware analysis requires a deep dive and there are many great tools and services that provide information about a malware sample you can build your analysis on.

If you work as an incident responder, detection engineer, threat hunter, or intel analyst, you probably already do some malware analysis but don’t realize it. And if you don’t but would like to, this talk will discuss the tools and knowledge you should focus on first before embarking on groking the intel x86 manual.