Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ready? Which Came First: The Phish or the Opportunity to Defend Against It Started from the Bottom: Exploiting Data Sources to Uncover ATT&CK Behaviors Reaping What They Sow - Hard Lessons Learned Emulating Threat Actors Getting Bear-y Cozy with PowerShell ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own environment for better sleep and a safer tomorrow