Difference between revisions of "Schedule"
From BruCON 2016
Security4all (talk | contribs) |
Security4all (talk | contribs) |
||
Line 92: | Line 92: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Trusted | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 105: | Line 104: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lockpicking | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Physical_locks_by_Toool | Lockpicking #1]]</span></p> |
− | |||
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 112: | Line 110: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Social | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 119: | Line 116: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Arduino | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]</span></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 126: | Line 122: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Wireless | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Wireless_auditing | Wireless Security #2]]</span></p> |
− | |||
</td> | </td> | ||
</tr> | </tr> | ||
Line 147: | Line 142: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>SQL | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 155: | Line 149: | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
lang=EN-GB style='font-size:9.0pt;font-family:"Arial","sans-serif"; | lang=EN-GB style='font-size:9.0pt;font-family:"Arial","sans-serif"; | ||
− | color:red'>Hex | + | color:red'>[[Challenge | The Hex Factor Intro workshop]]</span></b></p> |
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 161: | Line 155: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Dispelling | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span></b></p> |
− | |||
</td> | </td> | ||
</tr> | </tr> | ||
Line 203: | Line 196: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>How to | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 210: | Line 202: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Arduino | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]]</span></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 217: | Line 208: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Digital ID | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Digital_ID | Digital ID #1]]</span></p> |
− | |||
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 224: | Line 214: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 231: | Line 220: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Digital ID | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Digital_ID | Digital ID #2]]</span></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 238: | Line 226: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#Auditing_VOIP | VOIP #2]]</span></p> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 258: | Line 246: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 265: | Line 252: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Botnets, | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span></b></p> |
− | |||
</td> | </td> | ||
</tr> | </tr> | ||
Line 314: | Line 300: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Rage | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 328: | Line 313: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lightning Talks #1</span></p> | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]</span></p> |
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 334: | Line 319: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Open | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 341: | Line 325: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>JTAG | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#JTAG| JTAG Workshop #2]]</span></p> |
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 347: | Line 331: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lightning Talks #2</span></p> | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]] |
+ | |||
+ | </span></p> | ||
</td> | </td> | ||
</tr> | </tr> | ||
Line 367: | Line 353: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>All | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none; | ||
Line 381: | Line 366: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Red and | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 429: | Line 413: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Knowing | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 436: | Line 419: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Wireless | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Wireless_auditing | Wireless Security #1]]</span></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 443: | Line 425: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Auditing_VOIP | VOIP #1]]</span></p> |
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 449: | Line 431: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Malicious | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 456: | Line 437: | ||
background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lockpicking | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]</span></p> |
− | |||
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 484: | Line 464: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Building | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span></b></p> |
− | |||
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 491: | Line 470: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>The | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span></b></p> |
− | |||
</td> | </td> | ||
</tr> | </tr> | ||
Line 521: | Line 499: | ||
lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"; | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"; | ||
color:white'>DINNER BREAK & </span></b><b><span lang=EN-GB | color:white'>DINNER BREAK & </span></b><b><span lang=EN-GB | ||
− | style='font-size:9.0pt;font-family:"Verdana","sans-serif";color:red'>Hex | + | style='font-size:9.0pt;font-family:"Verdana","sans-serif";color:red'> & Hex |
Factor Contest winners</span></b></p> | Factor Contest winners</span></b></p> | ||
</td> | </td> |
Revision as of 00:52, 9 September 2009
- Wednesday 16/09 - Thursday 17/09: see Training
- Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks
Conference doors and registration will be open at 8:00 on Friday
Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations
Schedule
|
Friday 18 September |
Saturday 19 September |
|||||
Hour |
Track 1 |
Track 2 |
Track 3 |
Track 1 |
Track 2 |
Track 3 |
|
09:00 |
|
||||||
09:30 |
|||||||
10:00 |
Dispelling the myths and discussing the facts Global Cyber-Warfare |
||||||
10:30 |
|||||||
11:00 |
BREAK |
BREAK |
|||||
11:30 |
|||||||
12:00 |
|||||||
12:30 |
Transition to IPv6 on the Internet: Threats and Mitigation Techniques |
||||||
13:00 |
|||||||
13:30 |
LUNCH BREAK |
LUNCH BREAK |
|||||
14:00 |
|||||||
14:30 |
Soldering workshop #1 |
||||||
15:00 |
|||||||
15:30 |
All Your Packets Are Belong to Us - Attacking Backbone Technologies |
BISI initiative update |
|
||||
16:00 |
|||||||
16:30 |
BREAK |
BREAK |
|||||
17:00 |
Soldering workshop #2 |
||||||
17:30 |
|||||||
18:00 |
|||||||
18:30 |
|||||||
19:00 |
DINNER BREAK & EFF AUCTION |
DINNER BREAK & & Hex Factor Contest winners |
|||||
19:30 |
|||||||
20:00 |
Open HackerLounge |
BruCON afterPARTY & Happy Hour |
|||||
21:00 |
|||||||
|
|
||||||
03:00 |
|||||||