This document discusses vulnerabilities in Citrix systems that could allow unauthorized access. It begins with background on the speaker and their company. It then outlines several demonstrations of attacks on Citrix, including exploiting the kiosk mode, gaining unauthenticated access through brute force or exploits, using hidden hotkeys, restricting desktop access, and attacking Microsoft Office files. The document concludes with discussing the difficulty of fully remediating Citrix systems due to the large number of registry settings involved.