<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BSA8P7@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BSA8P7</pentabarf:event-slug>
            <pentabarf:title>Pre-Conference Class I: Practical Wireshark Skills for IT professionals</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260718T090000</dtstart>
            <dtend>20260718T170000</dtend>
            <duration>8.00000</duration>
            <summary>Pre-Conference Class I: Practical Wireshark Skills for IT professionals</summary>
            <description>Level up your Wireshark skills and get ready for Sharkfest! This hands-on course will provide core Wireshark skills for IT pros of all experience levels. Participants will gain a solid understanding of how to use Wireshark to capture, analyze, and troubleshoot network traffic. The course is designed with beginners in mind, but even seasoned packet people will pick up new tips and tricks.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Pre Conference Class</category>
            <url>https://conference.wireshark.org/sf26us/talk/BSA8P7/</url>
            <location>Room 1</location>
            
            <attendee>Ross Bagurdes</attendee>
            
            <attendee>Chris Greer</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BSA8P7@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BSA8P7</pentabarf:event-slug>
            <pentabarf:title>Pre-Conference Class I: Practical Wireshark Skills for IT professionals</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260719T090000</dtstart>
            <dtend>20260719T170000</dtend>
            <duration>8.00000</duration>
            <summary>Pre-Conference Class I: Practical Wireshark Skills for IT professionals</summary>
            <description>Level up your Wireshark skills and get ready for Sharkfest! This hands-on course will provide core Wireshark skills for IT pros of all experience levels. Participants will gain a solid understanding of how to use Wireshark to capture, analyze, and troubleshoot network traffic. The course is designed with beginners in mind, but even seasoned packet people will pick up new tips and tricks.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Pre Conference Class</category>
            <url>https://conference.wireshark.org/sf26us/talk/BSA8P7/</url>
            <location>Room 1</location>
            
            <attendee>Ross Bagurdes</attendee>
            
            <attendee>Chris Greer</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>A3PJVZ@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-A3PJVZ</pentabarf:event-slug>
            <pentabarf:title>Pre-Conference Class II: Introduction to Stratoshark for Network Engineers</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260720T090000</dtstart>
            <dtend>20260720T170000</dtend>
            <duration>8.00000</duration>
            <summary>Pre-Conference Class II: Introduction to Stratoshark for Network Engineers</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Pre Conference Class</category>
            <url>https://conference.wireshark.org/sf26us/talk/A3PJVZ/</url>
            <location>Room 1</location>
            
            <attendee>Josh Clark</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>X73HTY@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-X73HTY</pentabarf:event-slug>
            <pentabarf:title>SharkFest&#x27;26 US Welcome Dinner &amp; Sponsor Showcase</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260720T173000</dtstart>
            <dtend>20260720T203000</dtend>
            <duration>3.00000</duration>
            <summary>SharkFest&#x27;26 US Welcome Dinner &amp; Sponsor Showcase</summary>
            <description>SharkFest&#x27;26 US Welcome Dinner &amp; Sponsor Showcase</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Dinner</category>
            <url>https://conference.wireshark.org/sf26us/talk/X73HTY/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>H89ETP@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-H89ETP</pentabarf:event-slug>
            <pentabarf:title>Things I Love About Wireshark (and maybe a couple of things I don&#x27;t)</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T090000</dtstart>
            <dtend>20260721T100000</dtend>
            <duration>1.00000</duration>
            <summary>Things I Love About Wireshark (and maybe a couple of things I don&#x27;t)</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Organization</category>
            <url>https://conference.wireshark.org/sf26us/talk/H89ETP/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>M8KMKW@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-M8KMKW</pentabarf:event-slug>
            <pentabarf:title>Don’t blame the network – ask the network!</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T101500</dtstart>
            <dtend>20260721T111500</dtend>
            <duration>1.00000</duration>
            <summary>Don’t blame the network – ask the network!</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/M8KMKW/</url>
            <location>Room 1</location>
            
            <attendee>David Soussan</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PKFXEY@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PKFXEY</pentabarf:event-slug>
            <pentabarf:title>Lessons learned in troubleshooting</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T113000</dtstart>
            <dtend>20260721T123000</dtend>
            <duration>1.00000</duration>
            <summary>Lessons learned in troubleshooting</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/PKFXEY/</url>
            <location>Room 1</location>
            
            <attendee>Kevin Tobin</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SAY8D9@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SAY8D9</pentabarf:event-slug>
            <pentabarf:title>Lost In Transmission</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T133000</dtstart>
            <dtend>20260721T143000</dtend>
            <duration>1.00000</duration>
            <summary>Lost In Transmission</summary>
            <description>Packets lost occur in many situations, showing the shape in various layers.
Differences in the number of packets between the passive start tap. (layer1,2)
The same IPID and a different offset as disappearance in the packet buffer in the router processing
Retransmission of TCP segments as a result of a traffic jam.
UDP application works with packet loss.

In this session, you can learn the major case of packet loss and you can find the way to find and count packet loss and retransmissions. Megumi shares the best way to understand invisible packet losses with Wireshark!</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/SAY8D9/</url>
            <location>Room 1</location>
            
            <attendee>Megumi Takeshita</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XPYXAB@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XPYXAB</pentabarf:event-slug>
            <pentabarf:title>Wireshark: The Prequel - What to do BEFORE you look at a capture</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T144500</dtstart>
            <dtend>20260721T154500</dtend>
            <duration>1.00000</duration>
            <summary>Wireshark: The Prequel - What to do BEFORE you look at a capture</summary>
            <description>This presentation is inspired by a series of articles I wrote on LinkedIn focused on practical, real world troubleshooting of application network performance issues.  Instead of deep diving in to packet captures, this presentation will highlight the various tools and metrics available on Linux systems that help engineers and administrators pinpoint the true source(s) of application performance problems when &quot;the network&quot; is blamed.  

We will focus on how packets are processed in a Linux system from the NIC, through the OS, up to the application.  We will then take a closer look at TCP itself, utilizing native Linux tooling to introspect on individual TCP socket performance.  This TCP socket introspection will dive in to each socket&#x27;s calculated network latency (RTT), packet sizing (MTU and MSS), and packet loss (retransmissions, SACK, duplicate ACKs</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/XPYXAB/</url>
            <location>Room 1</location>
            
            <attendee>Rob MacDonald</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FYWGV9@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FYWGV9</pentabarf:event-slug>
            <pentabarf:title>Feeding Frenzy of Wild Ideas: When Sharks Brainstorm</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T160000</dtstart>
            <dtend>20260721T170000</dtend>
            <duration>1.00000</duration>
            <summary>Feeding Frenzy of Wild Ideas: When Sharks Brainstorm</summary>
            <description>*Goal:*
Generate offbeat, humorous, impossible or “why would anyone even…” suggestions that just might reveal a surprisingly valuable insight for Wireshark’s future capabilities.

*Format:*
* Why absurd ideas matter.
* Warm Up
* Open SharkTank
* The ‘Maybe…’ scan

*Ground Rules:*
* All ideas are welcome.
* No shooting down concepts—only building on them.
* Humor encouraged; feasibility optional.
* The wilder, the better.

*Who Should Attend:*
Anyone who uses Wireshark, contributes to it, builds tooling around it, or likes thinking sideways. No technical depth required—just curiosity and a willingness to have fun.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Organization</category>
            <url>https://conference.wireshark.org/sf26us/talk/FYWGV9/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LRBBM8@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LRBBM8</pentabarf:event-slug>
            <pentabarf:title>Packets in the Power Grid: A Journey Inside the Substation</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T171500</dtstart>
            <dtend>20260721T181500</dtend>
            <duration>1.00000</duration>
            <summary>Packets in the Power Grid: A Journey Inside the Substation</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/LRBBM8/</url>
            <location>Room 1</location>
            
            <attendee>Daniel Lopez</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WNWRRU@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WNWRRU</pentabarf:event-slug>
            <pentabarf:title>Sponsor Technology Showcase Reception and Dinner</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T183000</dtstart>
            <dtend>20260721T213000</dtend>
            <duration>3.00000</duration>
            <summary>Sponsor Technology Showcase Reception and Dinner</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Dinner</category>
            <url>https://conference.wireshark.org/sf26us/talk/WNWRRU/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PDJYJ9@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PDJYJ9</pentabarf:event-slug>
            <pentabarf:title>MAC Privacy Protocol Wireshark Plugin</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T133000</dtstart>
            <dtend>20260721T143000</dtend>
            <duration>1.00000</duration>
            <summary>MAC Privacy Protocol Wireshark Plugin</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/PDJYJ9/</url>
            <location>Room 2</location>
            
            <attendee>Cameron Smith</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RKVN3B@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RKVN3B</pentabarf:event-slug>
            <pentabarf:title>Understanding LTE &amp; 5G: 3GPP Packet Flow and Network Analysis</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260721T144500</dtstart>
            <dtend>20260721T154500</dtend>
            <duration>1.00000</duration>
            <summary>Understanding LTE &amp; 5G: 3GPP Packet Flow and Network Analysis</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/RKVN3B/</url>
            <location>Room 2</location>
            
            <attendee>Mark Stout</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3BTBPN@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3BTBPN</pentabarf:event-slug>
            <pentabarf:title>Keynote: Packets through the ages – A personal story</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T090000</dtstart>
            <dtend>20260722T100000</dtend>
            <duration>1.00000</duration>
            <summary>Keynote: Packets through the ages – A personal story</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/3BTBPN/</url>
            <location>Room 1</location>
            
            <attendee>Peter Jones</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3YYFJM@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3YYFJM</pentabarf:event-slug>
            <pentabarf:title>From Zero to Captures: Setting Up Your Own Network Simulation Lab</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T101500</dtstart>
            <dtend>20260722T111500</dtend>
            <duration>1.00000</duration>
            <summary>From Zero to Captures: Setting Up Your Own Network Simulation Lab</summary>
            <description>Ever wanted to test a complex routing scenario, understand how a specific protocol behaves under certain conditions, or simply learn networking concepts without investing in expensive hardware? Network simulation offers a powerful alternative - your laptop becomes a complete network lab.
In this practical, hands-on session, you&#x27;ll discover how to create your own virtual network environments where you can safely experiment, break things, and learn. We&#x27;ll start from scratch and build up to capturing real traffic between simulated network devices, showing you exactly what&#x27;s possible with modern tools and where the boundaries lie.

**What You&#x27;ll Experience:**

The session begins with the fundamentals: why simulate networks, what scenarios benefit most from simulation, and what the realistic expectations are. You&#x27;ll see live demonstrations of creating network topologies - routers, switches, and hosts - all running on a single machine. We&#x27;ll capture traffic between these virtual devices using Wireshark, examining how packets flow through simulated networks.

A key focus will be understanding the difference between simulated and physical networks. What traffic patterns look like in virtual environments vs. real hardware, which protocols behave identically and which don&#x27;t, and when timing and performance characteristics matter. You&#x27;ll learn to recognize these differences in your captures.

We&#x27;ll explore practical integration scenarios: connecting your physical monitoring tools to virtual networks, setting up capture points in containerized environments, and understanding device-in-the-loop testing where virtual and physical components work together. This is especially relevant for anyone working with network TAPs, packet brokers, or monitoring solutions who want to test configurations before deploying to production.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/3YYFJM/</url>
            <location>Room 1</location>
            
            <attendee>Roland Knall</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VAHVRB@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VAHVRB</pentabarf:event-slug>
            <pentabarf:title>Media Casting Protocols: Everything AirPlay, AirDrop and Wi-Fi Aware</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T113000</dtstart>
            <dtend>20260722T123000</dtend>
            <duration>1.00000</duration>
            <summary>Media Casting Protocols: Everything AirPlay, AirDrop and Wi-Fi Aware</summary>
            <description>We will walk through: 

-AirPlay vs AirDrop
-The five phases of AirPlay 
-How to troubleshoot the phases over packet capture (802.11, BLE) and MacBook console
-The changes to AirPlay above iOS 26 and Android support
-Alternatives to AirPlay such as Wi-Fi Aware and Miracast, differences over in packet captures</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/VAHVRB/</url>
            <location>Room 1</location>
            
            <attendee>Eva Santos</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>A7BFDV@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-A7BFDV</pentabarf:event-slug>
            <pentabarf:title>The Packet Doctors are in! Packet trace examinations with the experts</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T133000</dtstart>
            <dtend>20260722T150000</dtend>
            <duration>1.03000</duration>
            <summary>The Packet Doctors are in! Packet trace examinations with the experts</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Packetdoctors Session</category>
            <url>https://conference.wireshark.org/sf26us/talk/A7BFDV/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FTMZDH@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FTMZDH</pentabarf:event-slug>
            <pentabarf:title>From Specs to Packets: Generating Binary Exchange Dissectors at Scale</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T151500</dtstart>
            <dtend>20260722T161500</dtend>
            <duration>1.00000</duration>
            <summary>From Specs to Packets: Generating Binary Exchange Dissectors at Scale</summary>
            <description>This talk presents the Open Markets Initiative (OMI) as a research platform built around a protocol-driven approach to dissector generation. OMI has produced over four million lines of Lua dissectors for real-world binary exchange protocols. The core idea is that the protocol binary data model itself, not the dissector, is the primary artifact. Once the protocol is captured in a structured, reusable form, multiple classes of tooling can be generated from it, with Wireshark dissectors as a key output.

We will examine several classes of exchange protocols and show how OMI’s generator differs from earlier iterations of code generation tools, “generations of generators.” Instead of emitting code from message templates, flat schemas or other domain specific languages, our binary data models encode protocol semantics, constraints, and structural variation explicitly. This allows families of related protocols to share definitions, makes version evolution tractable, and produces dissectors that are both predictable and auditable. Using real examples, we’ll show how generator design choices directly affect correctness, maintainability, and crowd contribution.

The entire electronic trading industry benefits from the open-source Wireshark and dissector ecosystem. Many exchange protocols are underspecified, implicitly defined, or guarded by information barriers. OMI turns reverse-engineering knowledge into shared specifications that can be reviewed, improved, and extended collaboratively. That process has led to a rapid expansion of accurate, production-grade dissectors, many of which are now relied on as primary analysis tools in the electronic-trading ecosystem.

The session is aimed at attendees interested in protocol modeling, code generation, advanced dissector design, and the ways open tooling can transform opaque binary systems into observable, debuggable infrastructure.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/FTMZDH/</url>
            <location>Room 1</location>
            
            <attendee>William Tegel</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SJTHY9@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SJTHY9</pentabarf:event-slug>
            <pentabarf:title>Examining NAT behavior with Wireshark - WCA Core Topic</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T163000</dtstart>
            <dtend>20260722T173000</dtend>
            <duration>1.00000</duration>
            <summary>Examining NAT behavior with Wireshark - WCA Core Topic</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/SJTHY9/</url>
            <location>Room 1</location>
            
            <attendee>Ross Bagurdes</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WVUP7Q@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WVUP7Q</pentabarf:event-slug>
            <pentabarf:title>Sponsor Technology Showcase Reception and Dinner</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T183000</dtstart>
            <dtend>20260722T213000</dtend>
            <duration>3.00000</duration>
            <summary>Sponsor Technology Showcase Reception and Dinner</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Dinner</category>
            <url>https://conference.wireshark.org/sf26us/talk/WVUP7Q/</url>
            <location>Room 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>8BDMAY@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-8BDMAY</pentabarf:event-slug>
            <pentabarf:title>Topology-Based PCAP Analysis: Faster Insight Beyond Packet Lists</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260722T151500</dtstart>
            <dtend>20260722T161500</dtend>
            <duration>1.00000</duration>
            <summary>Topology-Based PCAP Analysis: Faster Insight Beyond Packet Lists</summary>
            <description>Traditional packet analysis relies on sequential inspection of frames, which can obscure higher-level structure and slow down diagnosis, particularly for less experienced analysts. However, network behaviour is inherently relational, involving hosts, conversations, and protocol groupings.

This session presents a practical approach to PCAP analysis using real-time topology visualisation. Instead of focusing on individual packets, traffic is represented as a graph of nodes (hosts) and edges (conversations), allowing analysts to immediately identify communication patterns, dependencies, and anomalies.

A core case study will demonstrate a DNS resolution failure caused by a misconfigured gateway. In a standard packet list, this requires careful inspection of ARP requests, repeated DNS queries, and missing responses. In a topology view, the same issue is visible at a glance: a central host attempting external communication, combined with a misleading local dependency and no successful continuation.

The session will show how topology-based analysis:

Reduces cognitive load by externalising relationships
Accelerates identification of failure patterns
Supports both novice learning and expert triage workflows
Complements, rather than replaces, traditional packet inspection

Attendees will leave with a new mental model for analysing network traffic, and practical techniques for integrating structural reasoning into their existing workflows.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Presentation</category>
            <url>https://conference.wireshark.org/sf26us/talk/8BDMAY/</url>
            <location>Room 2</location>
            
            <attendee>Ryan Younger</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EUUK7H@@conference.wireshark.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EUUK7H</pentabarf:event-slug>
            <pentabarf:title>SharkBytes</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260723T090000</dtstart>
            <dtend>20260723T100000</dtend>
            <duration>1.00000</duration>
            <summary>SharkBytes</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Organization</category>
            <url>https://conference.wireshark.org/sf26us/talk/EUUK7H/</url>
            <location>Room 1</location>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
