Difference between revisions of "Schedule"
From BruCON 2016
Security4all (talk | contribs) |
Security4all (talk | contribs) |
||
Line 7: | Line 7: | ||
** Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian | ** Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian | ||
** Head Hacking – The Magic of Suggestion and Perception by Dale Pearson | ** Head Hacking – The Magic of Suggestion and Perception by Dale Pearson | ||
+ | ** Cyber [Crime|War] - connecting the dots by Ian Amit | ||
* Workshops: | * Workshops: | ||
**Cryptanalysis workshop: Breaking office encryption by Eric Filiol | **Cryptanalysis workshop: Breaking office encryption by Eric Filiol | ||
Line 12: | Line 13: | ||
** Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani | ** Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani | ||
** Lockpicking 101 by Walter Bergers TOOOL.nl | ** Lockpicking 101 by Walter Bergers TOOOL.nl | ||
+ | ** Malicious PDF analysis by Didier Stevens | ||
** RFID workshop by Philippe Teuwen | ** RFID workshop by Philippe Teuwen | ||
** Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk | ** Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk |
Revision as of 20:02, 8 May 2010
Our Call for Papers 2010 just closed. Expect a partial schedule soon!
Currently confirmed are:
- Keynote: Memoirs of a Data Security Street Fighter by Mikko Hypponen
- Presentations:
- Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian
- Head Hacking – The Magic of Suggestion and Perception by Dale Pearson
- Cyber [Crime|War] - connecting the dots by Ian Amit
- Workshops:
- Cryptanalysis workshop: Breaking office encryption by Eric Filiol
- Hardware Hacking Area: Learn To Make Cool Things With Microcontrollers! by Mitch Altman
- Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani
- Lockpicking 101 by Walter Bergers TOOOL.nl
- Malicious PDF analysis by Didier Stevens
- RFID workshop by Philippe Teuwen
- Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk
- The Security Innovation Network - Cluster of Clusters by Ulrich Seldeslachts
For more information, check our F.A.Q.
The 2009 archive with videos and presentations can be found on the 2009 wiki
Latest news
<rss>http://blog.brucon.org/feeds/posts/default?alt=rss%7Ccharset=UTF-8%7Cdate%7Cmax=5</rss>