Dayton's community-driven infosec conference

BSidesDayton 2026

Dayton's community-driven infosec conference. Join security professionals, researchers, and hackers for hands-on learning, real conversations, and practical knowledge.

2026 Theme: "Going Offline – Decentralize, Disconnect, DIY"

Saturday , May 23, 2026
9:30 AM to 5:00 PM
0 days, 0 hours, 0 minutes, and 0 seconds until the event

Fairborn City Church

206 W. Dayton-Yellow Springs Rd.

Fairborn, OH, United States, Ohio

Sponsors for 2026

Get Involved

Timeline

Nov 21, 2025

Call for papers, workshops, and villages open

Share your research, ideas, or lessons learned with the Dayton infosec community. All experience levels welcome. Propose a hands-on session that teaches practical skills and gets people building, breaking, or exploring.

Nov 26, 2025

Tickets for sale

Grab your spot for BSidesDayton 2026. Limited tickets, first come first served.

Mar 20, 2026

Call for papers closes

Submit your talk before the deadline.

Apr 10, 2026

All presenters announced

All of the presenters will be informed if the paper was accepted and the complete schedule will be sent out.

May 23, 2026

Conference begins

Conference Schedule

Check out the full lineup of talks, workshops, and villages across multiple tracks so you can plan your day and catch the sessions that matter most to you.

9:30 AM

Welcome and Keynote

Not yet announced.

10:00 AM

Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites

Annie Dai | 60 Minutes

A broad scan of cleartext IP traffic across dozens of GEO satellites shows how critical infrastructure backhaul is exposed and what that means for defenders.

11:00 AM

You've Probably Never Heard of the Reticulum Network

Guy Royse | 60 Minutes

Reticulum is a cryptography-based stack for resilient, decentralized communication when centralized infrastructure fails or gets cut off.

12:00 PM

Lunch

Not yet announced.

1:00 PM

These aren't the Providers you are looking for: Compromising pipelines with Evil Terraform

Dakota Riley | 60 Minutes

Malicious Terraform providers can steer CI pipelines and deepen access, with attack paths, mitigations, and a live demo.

2:00 PM

Definitely Not Secure (DNS)

Matt Scheurer | 60 Minutes

DNS fundamentals, live demos of common attacks, and practical defensive tactics for people who use DNS every day but rarely treat it as a primary attack surface.

3:00 PM

Presentation 5

Not yet announced.

4:00 PM

Presentation 6

Not yet announced.

5:00 PM

Closing Address

Not yet announced.

5:30 PM

After Party

Learn More

Join us after the conference at Wandering Griffin Brewery & Restaurant from 5:30 PM to 10:00 PM. Enjoy complimentary hors d'oeuvres and non-alcoholic drinks, and networking with fellow attendees.

10:00 AM

A typhoon of Problems | A short brief on Salt Typhoon's History and TTPs

Mason Herzner | 60 Minutes

Silk Typhoon history for blue team hunters, covering past campaigns, TTPs, exploits, and malware in a shorter format.

11:00 AM

Session 2

Not yet announced.

11:30 AM

Lunch

Not yet announced.

1:30 PM

Agentic AI Kill Chain

Martin Voelk | 30 Minutes

Enterprise AI agents in chat apps enable poisoned RAG, malicious link unfurling, and zero-click exfiltration, with guidance on how to test and defend.

2:00 PM

Session 4

Not yet announced.

2:30 PM

You guys are getting paid? A story of how I got into hardware hacking.

Jeremy Hong | 30 Minutes

A path from a Dayton local meetup into hardware hacking, plus where the tooling stands today.

3:00 PM

A Standard For Investigative Playbooks

Matthew Gracie | 60 Minutes

YAML investigation playbooks that tie alerts and artifacts to methodology and defensive tooling, with a demo in an open monitoring platform.

Call Center Village

Learn More

Explore the tools, platforms, and techniques behind modern voice-based social engineering, covering both AI-powered call agents and live human operators. Features The Escalation Desk CTF, The Learning Line demonstrations, The Demarcation Demo, and an interactive British-style phone booth.

Radio Village

Learn More

Explore the invisible world of wireless communication using software-defined radio, amateur radio, and other RF technologies, all with affordable hardware and free tools.

P25 Radio Village

Learn More

Explore APCO Project 25 radio systems through DVMProject demos, Raspberry Pi hotspots, live FNE infrastructure, and hands-on looks at encryption and key management on retired public-safety gear. Bring your radios!

Sticker Heist

Learn More

A story-driven cybersecurity heist where teams recon a protected safe, disable its defenses, and crack it open for the sticker loot without triggering the alarms.

Reactor Control Village

Learn More

Step into a hands-on power plant simulation where you monitor the system, experiment with control logic, and try to guide the plant through shutdown before it spirals into failure.

After Party

Join us after the conference at Wandering Griffin Brewery & Restaurant from 5:30 PM to 10:00 PM. Enjoy complimentary hors d'oeuvres and non-alcoholic drinks, and networking with fellow attendees.

  • Complimentary Food
  • Complimentary Non-Alcoholic
  • Networking

Capture the Flag

A story-driven CTF that follows a single arc from breakdown to rebuilding trust. Expect challenges that connect across the full incident lifecycle, from upstream compromise to deliberate recovery.

Five Categories

Cause Collapse Survival Recovery Trust

Code of Conduct

BSidesDayton is committed to creating a welcoming environment where everyone can learn, share, and participate without fear of harassment or discrimination. We expect all attendees, speakers, sponsors, volunteers, and organizers to treat others with professionalism and respect.

Harassment or exclusionary behavior is not acceptable in any form. If you experience or witness behavior that violates our code, please reach out to a staff member immediately.