Difference between revisions of "Schedule"
From BruCON 2016
Security4all (talk | contribs) |
Security4all (talk | contribs) |
||
Line 95: | Line 95: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span><br> Vincent Rijmen</b></p> |
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 113: | Line 113: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]]</span><br>Sharon Conheady</b></p> |
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 145: | Line 145: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span><br>Justin Clarke</b> </p> |
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 158: | Line 158: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span><br>Jayson E. Street</b></p> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 199: | Line 199: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span><br>Eric Adrian Filiol</b></p> |
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 217: | Line 217: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]]</span><br>Stephan Chenette</b></p> |
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 249: | Line 249: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span><br>Eric Vyncke</b></p> |
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 255: | Line 255: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span><br>Julia Wolf</b></p> |
</td> | </td> | ||
</tr> | </tr> | ||
Line 303: | Line 303: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span><br>Paul James Craig</b></p> |
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 321: | Line 321: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span><br>Chris Gates</b></p> |
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 355: | Line 355: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span><br>Daniel Mende & Roger Klose</b></p> |
</td> | </td> | ||
<td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none; | ||
Line 368: | Line 368: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span>Chris Nickerson<br></b></p> |
</td> | </td> | ||
<td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 415: | Line 415: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span><br>Brian Honan</b></p> |
</td> | </td> | ||
<td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none; | ||
Line 433: | Line 433: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span><br>Mario Heiderich</b></p> |
</td> | </td> | ||
<td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none; | ||
Line 465: | Line 465: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span><br>astera</b></p> |
</td> | </td> | ||
<td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none; | ||
Line 471: | Line 471: | ||
padding:0in 5.4pt 0in 5.4pt'> | padding:0in 5.4pt 0in 5.4pt'> | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
− | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span></b></p> | + | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span><br>Craig Balding</b></p> |
</td> | </td> | ||
</tr> | </tr> |
Revision as of 23:47, 10 September 2009
On Wednesday 16/09 & Thursday 17/09 prior to the conference, BruCON is offering some excellent security classes. See Training for details.
Conference doors and registration will be open at 8:00 on Friday
Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations
Click here to see the complete List of Workshops
Click here to see the complete List of Lightning talks