CypherCon is Wisconsin’s premier technology and hacker conference, bringing together cybersecurity professionals, tech enthusiasts, and innovators to share knowledge and explore cutting-edge ideas. With engaging keynotes, interactive workshops, and creative challenges, it fosters a collaborative and vibrant community.
CYPHERCON
Wisconsin’s largest technology conference
Technology, AI, Security, Hacking – and everything in between
Wisconsin’s largest technology conference
2026 Keynotes

KEYNOTE: Echoes from the Net: Floppy Memories, Digital Fingerprints
Mishaal Khan

KEYNOTE: Cybersecurity lessons learned from working at an Alaskan ISP in the 90s
Bruce Potter
What
Wisconsin’s largest technology conference, an event with over 125 technology, cybersecurity, artificial intelligence, and privacy presentations.
Presentations

The Pre-Internet Computer: Hacking a System Older Than the Web
Adam Toscher

Netscape, Dial-Up, and Data Breaches: Browser Risk Then vs Now
Jesse Durkee

Title From Prompt to Payload: Defending Al-Driven Tools in Adversarial Setting
Shubham Mishra & Rajeev Ranjan Diwakar

Ctrl + Alt + Lead: Rebooting Cyber Culture with Human Skills
Amanda Kollmorgan

Getting Catfished by AI: Why Your CEO Might Not Be Who You Think They Are
James McQuiggan

Simple Steps for Security Teams to Stay on the Right Side of the Law
Zach Willenbrink

Seeing Is Deceiving: Deepfakes, Creative Power, and the New Trust Crisis
Kyle Hinterberg

The Price of a Life Online: Valuing Personally Identifiable Information on the Dark Web
Andréanne Bergeron

The Internet Is Fun Again and We Are Repeating All the Same Mistakes
Ryan Zagrodnik

Invisible Gateways: How Threat Actors Exploit IoT to Breach Organizations
Phillip Wylie

Beyond TLS: Zero-Trust Payload Encryption for Multi-Cloud APIs
Ronak Patel

Tales From the Crypt…Analyst: The After Life
Jeff Man

Privacy in design (PbD) in DevSecOps
Anitha Dakamarri

FIPS-140 Level 3 encryption is just an API call away
Marko Sluga

“DLP: Didn’t Live uP” “Legacy DLP fell short but DSPM can help it live up to its promise
Ward Balcerzak

Inside M(AI)ware: Behavior, Analysis, and Detection
Dr. Fatou Sankare

Cybersecurity is Ready for Local Models
Michael Roytman

The End of Click Rates: A New Era for Cybersecurity Awareness
Jake Wesenberg

Chasing Shapeshifters: Investigating AI-Generated Polymorphic Malware
Stephen Sam

Cheese, Code, and Cybercrime: Wisconsin’s Role in Hacker History
Kyle Hinterberg

Evolving PCI: Turning Compliance Into Continuous Defense
Kyle Hinterberg

Cyber Tabletop Exercises: Choose your Adventure
Omar A. Rivera Merced

Papa! Mama! Watch me campaign in the cloud!
Anna Akselevich & Yaniv Miron

Ransomware vs. Info Stealers: A Comparative Analysis
Steph Shample

Bypassing BitLocker: Full Disk Decryption for less than $5
Allen & Dale Cook

The Personal Branding Patch You Didn’t Know You Needed
Terra L. Fletcher

The Cold War Goes Online
Kayne Whitney

I Stole Your Azure Tenant With a Login Link
Eric Boyd

So, You Want to be a Forensicator…
Catherine Ullman

Securing the Perimeter: Credential Security Fundamentals
Shelby Palmersheim

The Importance of Networking in the Cybersecurity Community
Michael Lenz

“You Keep Using That Word… I Do Not Think It Means What You Think It Means: A Survey of CTI Terms”
April Lenhard

Open Source House Party
Kadi McKean

WTF is going on with CVE?
Josh Bressers

From Concert Hall to Code Review, Symphony to Software
Sarah Peters

Filtering the Noise: Crafting an Actionable Threat Feed from Community-Shared Intelligence
JJ Josing

AI-Powered GRC: Leveraging Machine Learning for Risk Prediction and Compliance Automation
Kartik Khurana & Pranay Suri

Choosing Where to Hit: How Defenders Can Shape Adversary Behavior
Greg Conti & Tom Cross

WarGames for Defenders: Playing Threats with MITRE ATT&CK Navigator
Thomas Freeman

RAGe Against the Machine: AI-Powered Compliance and Cybersecurity
Brennan Lodge

Cyber $ & Uncommon Sense! WI CRT Cyber Fire Fighters
Troy Stairwalt

Make Your Point: Crafting Compelling Cyber Narratives
Joe Nay

Empowering patients use to artificial intelligence
Lisa Tee

Quantum Ready – A Framework for Enterprise Post Quantum Readiness
Walt Powell

The Swiss cheese of SaaS identity security
Eric Woodruff

Privacy & Compliance Challenges with AI: Safeguarding Data in the Age of Artificial Intelligence
Noor Bains

What Attackers Automate First (And Why You Should Care)
Jeremiah Salzberg

Shall We Play a Game? Breaking Weak Ciphers and Exploring AI-Generated Text
Jamie Grunewald

What happens if you handed Them the Keys: Moving from Assumed Breach to Assumed Insider
Will Bonk

Your AI is Social Engineering You
J Wolfgang Goerlich

From Weak Keys to AI Agents: How Machine Identity Became the New (Yet Old) Attack Surface
Brice Williams

Strengthen cyber resilience for Entra ID and Microsoft 365
Vanessa Toves

Detection to Decision: Agentic AI at the Edge for Security Operations
John Platais

Stealing From Thieves
Nicholas Anastasi & Juan Pablo Gomez Postigo

The Falacy of a Safe Encryption Backdoor
Bill Bernard

What the Scope? Sh** my Consultant | Client Says
Qasim Ijaz

Red Team on a Budget
Jacob Peacy

Meschcore & Meshtastic Command & Control Infrastructure
Eric Escobar

How the Vietnam War created single sign-on – and how it’s evolved since
Connor Peshek

CTI Bingo: RMM Abuse, Supply Chains, and EDR Killers
Sam Mayers

Don’t waste your time (in this talk)
Jeremy Bauer

4 Steps, Repeat: threat modeling is a dance
Sean Juroviesky

OPSEC For Liberation Movements: Field Notes from 2025
Daly Barnett

Capture the Flag 101
Micah Silverman

Boardroom Battles: Successful Cyber Risk reporting
Ian Curtis

Red Team Lessons from Copilot Deployments
Christian Stegh

Some Hot Dicom Polyglot Action
Danny Hetzel

From Basement Hackers to AI Criminals: What the Old Internet Created
Mike Wright

N8N: The Automation Powerhouse – Building Production-Ready AI Agents Without the Code Complexity
Sri Hari Deep Kolagani

Hack the Human: Sales Psychology for Cyberpreneurs
Chad Coe
TBA
TBA

Hardware Implant Revolution II: Development of Hardware Implants for Red Team Operations
Victor Fernandez Minguillon

IAM? OMG! Avoiding Common Pitfalls in Identity and Access Management.
Rebecca Jones

IIoT: The “S” Still Stands for Security
Luciano Moretti

Inside the Mind of a Game Hacker
Eric Boyd & Son

The Hardware Procurement Iceberg: A Framework For Keeping Embedded Research Fun, Cheap, and Ethical
Yltsi SecResearch

Password Cracking Methodologies
Dustin Heywood / EvilMog

Protecting Main Street from Malware: A Cyber Briefing for busy leaders
Karen Arthur

Tales from the Inside: An Incident Response Weekend
Sahan Fernando

Spiders, Deepfakes, and Access Credentials
Tom Cross

The Importance of Being in Third Place
Robert Wagner

Cybersecurity’s new villain – Deep Fakes
Sankalp Kumar

A Series of Unfortunate Event (Listeners)
Ryan Bonner

Hack The Hacker (aka I’ve Been Pwned)
Jose Martinez

Advanced Personal Privacy
Speaker Name (Withheld for Privacy)

Offense for Defense
Tim Medin

The Quantum Shift: Assessing PQC on Your Network
Anita Nikolich

How To Deal Drugs
Connor N/A

This Little Brite of Mine: Mobile Forensics for Fun and (Sometimes) Profit
Kaden Payne

Beyond the Firewall: Responding to Cyber Incidents in Industrial Control Systems
Chriss Hansen

Choose Your Own Adventure: The Interactive Talk on Tabletop Exercises
Josh Harr
Workshops

From Samples to Signatures: Introduction to Static Malware Analysis and YARA
$500

Certified Vibe Hacker
$150

Adversarial Thinking
$1500

Level UP OSINT
$725

Stop Reacting, Start Predicting – Threat Modeling
$300

Binary Jiu-Jitsu: White Belt Fundamentals
$300

The True Beginner’s Guide to a CMMC Career
$1000
April 1-2, 2026
The space for
hobbyists hackers technologists hackers leaders enthusiasts nerds hackers leaders
Venue Info
Baird Center
400 W Wisconsin Ave
Milwaukee, WI 53203
2026 InfoSec Spring Break
March 30/31 – Mon & Tues: Training
April 1/2 – Wed & Thurs: CypherCon
April 3 – Friday: BSidesMKE
Milwaukee, WI