RSTCON2025 Program – powered by OpenConf Talk Schedule - Talk Lineup - Speaker BiosFriday, 24 October 202512:00-13:00Registration Open (Talmadge Room)13:00-13:30RSTCON Kickoff (Forsythe Room)Opening RemarksJames Warne; Matt Miller13:30-16:30RSTCON Day 1 (Forsythe Room)Hardware Identity Is Hard: Securing Edge & Ai Agents With Open StandardsAndrew McCormickStop Trading Security For Predictive Power: Retrofitting Diagnostic Capabilities For In-Place Ai Systems In Electrical Grid Operational Technology (ot)Emily SowardAdopting Ai To Protect Industrial Control Systems: Assessing Challenges and Opportunities From The Operators’ PerspectiveClement Fung16:30-17:30Keynote - Josh Corman (Forsythe Room)17:30-18:30Registration Close (Talmadge Room)18:30-20:30INL's Consequence Informed Engineering Workshop (Forsythe Room)Saturday, 25 October 202509:00-09:30Registration Open (Talmadge Room)09:30-10:30Keynote - Tim Kosiba (Forsythe Room)10:30-11:30Forsythe RoomOglethorpe RoomResearch CompetitionAttributions For Ml-Based Ics Anomaly Detection: From Theory To PracticeClement FungPractitioner TrackAndroid Malware ObfuscationJoshua SatterfieldWhen Java Meets Iot: Challenges For Secure OperationMarc Schoenefeld11:30-12:30Forsythe RoomOglethorpe RoomResearch CompetitionAcoustic Side Channel Attack On Keyboards Based On Typing PatternsAlireza TaheritajarPractitioner TrackRethinking Segmentation: Why Vlans Fail In Critical Infrastructure NetworksFlorian Doumenc12:30-13:30Lunch (On your own)13:30-15:30Forsythe RoomOglethorpe RoomResearch Competition / TrackStyx Emulator: Public Release and Future RoadmapJordan MooreMapping The Research Landscape - An Exploratory Analysis of Ai Applications In Digital Forensics | SpringerlinkPouria RadPractitioner TrackAn Adversarial Loop For Robust Phishing Detection In Critical Infrastructure Email SystemsAayush KumarSecuring The Supply Chain With Github: Inside Kong’s Public Shared Actions StrategyPankaj Mouriya15:30-16:00Break (Talmadge Room)16:00-17:00Forsythe RoomOglethorpe RoomPractitioner TrackSafeguarding Industrial Control In The Era of Genai and Agentic IntelligenceLiliane ScarpariPractitioner TrackAnchored In Zero Trust: Securing Maritime Port InfrastructureJace Powell17:00-18:00National Labs Panel -- Host Aaron Crow (Forsythe Room)18:00-18:30Registration Close (Talmadge Room)19:00-21:00Happy HourSunday, 26 October 202509:00-09:30Registration Open (Talmadge Room)09:30-11:30Forsythe RoomOglethorpe RoomPractitioner TrackBeyond The Exploit: Breach From The Attacker’s Point of ViewEvan AndersonRed Team Vs. Sidecar: Threat Modeling The Credential Injection PipelineRhys EvansResearch TrackEmpowering Ai-Driven Healthcare With Secure, Decentralized, and Privacy-Enhancing Adaptive IntelligenceHussien AbdelRaouf KhaledFrom Seaweed To Security: Harnessing Alginate To Challenge Iot Fingerprint AuthenticationPouria Rad11:30-12:00Break (Talmadge Room)12:00-13:00Forsythe RoomOglethorpe RoomResearch TrackWhat Data Tells Us About How Apts Really Attack Critical InfrastructureYmir VigfussonRST Pulled HighCyber First Aid and Self Healing SystemsDavid KovarOwn The ConJames Warne; Matt Miller13:00-13:30Registration Close (Talmadge Room)