Difference between revisions of "Schedule"
From BruCON 2016
Security4all (talk | contribs) |
Security4all (talk | contribs) |
||
Line 273: | Line 273: | ||
<p class=MsoNormal align=center style='text-align:center'><b><span | <p class=MsoNormal align=center style='text-align:center'><b><span | ||
lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"; | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"; | ||
− | color:white'>LUNCH BREAK<br><br>14:20 Introduction of the CERT.be</span></b></p> | + | color:white'>LUNCH BREAK</span><br><br><span |
+ | lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif";style='color:red'>14:20 Introduction of the CERT.be</span></b></p> | ||
</td> | </td> | ||
<td width=384 colspan=4 rowspan=2 style='width:4.0in;border-top:none; | <td width=384 colspan=4 rowspan=2 style='width:4.0in;border-top:none; |
Revision as of 10:15, 17 September 2009
Download an electronic version of the schedule for your Android smartphone. Screenshots and details are here
Conference doors and registration will be open at 8:00 on Friday
Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations
Click here to see the complete List of Workshops
Click here to see the complete List of Lightning talks
Schedule
|
Friday 18 September |
Saturday 19 September |
|||||
Hour |
Presentation room |
Workshop Track #1 |
Workshop Track #2 |
Presentation room |
Workshop Track #1 |
Workshop Track #2 |
|
09:00 |
Trusted Cryptography |
|
Social engineering for penetration testers |
||||
09:30 |
|||||||
10:00 |
SQL Injection - how far does the rabbit hole go? |
Dispelling the myths and discussing the facts Global Cyber-Warfare |
|||||
10:30 |
|||||||
11:00 |
BREAK |
BREAK |
|||||
11:30 |
How to prepare, coordinate and conduct a cyber attack |
A new web attack vector: Script Fragmentation |
|||||
12:00 |
|||||||
12:30 |
Transition to IPv6 on the Internet: Threats and Mitigation Techniques |
Botnets, Ransomware, Malware, and Stuff! |
|||||
13:00 |
|||||||
13:30 |
LUNCH BREAK |
LUNCH BREAK |
|||||
14:00 |
|||||||
14:30 |
Rage Against The Kiosk |
Lightning Talks #1 |
Open Source Information Gathering |
Lightning Talks #2
|
|||
15:00 |
|||||||
15:30 |
All Your Packets Are Belong to Us - Attacking Backbone Technologies |
BISI initiative
update |
Red and Tiger TeamChris Nickerson |
|
|||
16:00 |
|||||||
16:30 |
BREAK |
BREAK |
|||||
17:00 |
Knowing Me Knowing You (The dangers of social networks) |
Malicious Markup - I thought you were my friend - cycle 3 |
|||||
17:30 |
|||||||
18:00 |
The Belgian Beer Lovers Guide to Cloud Security |
||||||
18:30 |
|||||||
19:00 |
DINNER BREAK & EFF AUCTION |
DINNER BREAK & & Hex Factor Contest winners |
|||||
19:30 |
|||||||
20:00 |
Open HackerLounge |
BruCON afterPARTY & Happy Hour |
|||||
21:00 |
|||||||
|
|
||||||
03:00 |
|||||||