RSTCON2025 Program – powered by OpenConf
Talk Schedule - Talk Lineup - Speaker Bios
Friday, 24 October 2025
12:00-13:00
(Talmadge Room)
13:00-13:30
(Forsythe Room)Opening RemarksJames Warne; Matt Miller
13:30-16:30
(Forsythe Room)Hardware Identity Is Hard: Securing Edge & Ai Agents With Open StandardsAndrew McCormickStop Trading Security For Predictive Power: Retrofitting Diagnostic Capabilities For In-Place Ai Systems In Electrical Grid Operational Technology (ot)Emily SowardAdopting Ai To Protect Industrial Control Systems: Assessing Challenges and Opportunities From The Operators’ PerspectiveClement Fung
16:30-17:30
(Forsythe Room)
17:30-18:30
(Talmadge Room)
18:30-20:30
(Forsythe Room)
Saturday, 25 October 2025
09:00-09:30
(Talmadge Room)
09:30-10:30
(Forsythe Room)
10:30-11:30
Forsythe RoomOglethorpe Room
Attributions For Ml-Based Ics Anomaly Detection: From Theory To PracticeClement FungAndroid Malware ObfuscationJoshua SatterfieldWhen Java Meets Iot: Challenges For Secure OperationMarc Schoenefeld
11:30-12:30
Forsythe RoomOglethorpe Room
Acoustic Side Channel Attack On Keyboards Based On Typing PatternsAlireza TaheritajarRethinking Segmentation: Why Vlans Fail In Critical Infrastructure NetworksFlorian Doumenc
12:30-13:30
(On your own)
13:30-15:30
Forsythe RoomOglethorpe Room
Styx Emulator: Public Release and Future RoadmapJordan MooreMapping The Research Landscape - An Exploratory Analysis of Ai Applications In Digital Forensics | SpringerlinkPouria RadAn Adversarial Loop For Robust Phishing Detection In Critical Infrastructure Email SystemsAayush KumarSecuring The Supply Chain With Github: Inside Kong’s Public Shared Actions StrategyPankaj Mouriya
15:30-16:00
(Talmadge Room)
16:00-17:00
Forsythe RoomOglethorpe Room
Safeguarding Industrial Control In The Era of Genai and Agentic IntelligenceLiliane ScarpariAnchored In Zero Trust: Securing Maritime Port InfrastructureJace Powell
17:00-18:00
(Forsythe Room)
18:00-18:30
(Talmadge Room)
19:00-21:00
Sunday, 26 October 2025
09:00-09:30
(Talmadge Room)
09:30-11:30
Forsythe RoomOglethorpe Room
Beyond The Exploit: Breach From The Attacker’s Point of ViewEvan AndersonRed Team Vs. Sidecar: Threat Modeling The Credential Injection PipelineRhys EvansEmpowering Ai-Driven Healthcare With Secure, Decentralized, and Privacy-Enhancing Adaptive IntelligenceHussien AbdelRaouf KhaledFrom Seaweed To Security: Harnessing Alginate To Challenge Iot Fingerprint AuthenticationPouria Rad
11:30-12:00
(Talmadge Room)
12:00-13:00
Forsythe RoomOglethorpe Room
What Data Tells Us About How Apts Really Attack Critical InfrastructureYmir VigfussonCyber First Aid and Self Healing SystemsDavid KovarOwn The ConJames Warne; Matt Miller
13:00-13:30
(Talmadge Room)