Difference between revisions of "Schedule"
From BruCON 2016
|  (→Day 2 : Thursday September 27th) | |||
| (123 intermediate revisions by 7 users not shown) | |||
| Line 1: | Line 1: | ||
| __NOTOC__ | __NOTOC__ | ||
| + | {| border="1" width="100%" style="text-align:center;" | ||
| + | | The completed schedule is available on '''http://sched.brucon.org/grid-full''' | ||
| + | |- | ||
| + | |} | ||
| + | |||
| + | |||
| =General Information= | =General Information= | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | + | * '''Registrations start at 8h30!''' | |
| + | * Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer | ||
| + | * Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue | ||
| + | * Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.''' | ||
| + | * Read our important instructions on [[how to use SCHED.org]]! | ||
| + | * This schedule is subject to change, check back regularly.  | ||
| − | ''' | + | '''Talks:''' | 
| − | |||
| − | |||
| − | + |  * Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates | |
| − | *  | + |  * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam | 
| − | *  | + |   * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand | 
| − | + |  * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody | |
| − | *  | + |  * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil | 
| − | *  | + |  * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs | 
| − | *  | + |  * Security through design - Making security better by designing for people - Jelle Niemantsverdriet | 
| − | *  | + |  * Esoteric Web Application Vulnerabilities - Andres Riancho | 
| − | *  | + |  * Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon | 
| − | *  | + |  * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos | 
| − | *  | + |  * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem | 
| − | *  | + |  * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma | 
| − | *  | + |  * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler | 
| − | *  | + |  * Anti-Forensics AF - DualCore | 
| − | *  | ||
| − | |||
| − | |||
| − | '''Workshops''' | + | '''Workshops:''' | 
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| + |  * The Control Things Workshop - Justin Searle | ||
| + |  * Hacking The Enterprise - Nathan Magniez and Wim Remes | ||
| + |  * Brewcon - Chris Lytle | ||
| + |  * Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson | ||
| + |  * Analyzing Malicious Office Documents - Didier Stevens | ||
| + |  * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout | ||
| + |  * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson | ||
| + |  * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo | ||
| + |  * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya | ||
| + |  * Putting a lock around your containers with Docker Security Primitives - Nils De Moor | ||
| − | |||
| − | |||
| − | |||
| − | + | Final times for talks are still being finalised. | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
Latest revision as of 13:33, 18 October 2016
| The completed schedule is available on http://sched.brucon.org/grid-full | 
 
General Information
- Registrations start at 8h30!
- Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
- Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
- Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
- Read our important instructions on how to use SCHED.org!
- This schedule is subject to change, check back regularly.
Talks:
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs * Security through design - Making security better by designing for people - Jelle Niemantsverdriet * Esoteric Web Application Vulnerabilities - Andres Riancho * Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler * Anti-Forensics AF - DualCore
Workshops:
* The Control Things Workshop - Justin Searle * Hacking The Enterprise - Nathan Magniez and Wim Remes * Brewcon - Chris Lytle * Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson * Analyzing Malicious Office Documents - Didier Stevens * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya * Putting a lock around your containers with Docker Security Primitives - Nils De Moor
Final times for talks are still being finalised.