Difference between revisions of "Schedule"
From BruCON 2016
Line 21: | Line 21: | ||
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam | * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam | ||
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand | * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand | ||
− | * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody | + | * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody |
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil | * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil | ||
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs | * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs | ||
Line 29: | Line 29: | ||
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos | * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos | ||
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem | * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem | ||
− | * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma | + | * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma |
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler | * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler | ||
− | * | + | * Anti-Forensics AF - DualCore |
Line 38: | Line 38: | ||
* The Control Things Workshop - Justin Searle | * The Control Things Workshop - Justin Searle | ||
* Hacking The Enterprise - Nathan Magniez and Wim Remes | * Hacking The Enterprise - Nathan Magniez and Wim Remes | ||
− | |||
* Brewcon - Chris Lytle | * Brewcon - Chris Lytle | ||
− | * Hunting Malware with osquery at scale - Nick Anderson | + | * Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson |
* Analyzing Malicious Office Documents - Didier Stevens | * Analyzing Malicious Office Documents - Didier Stevens | ||
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout | * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout | ||
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson | * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson | ||
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo | * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo | ||
− | * 802.11 Leakage: How passive interception leads to active exploitation - | + | * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya |
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor | * Putting a lock around your containers with Docker Security Primitives - Nils De Moor | ||
* Visual Network and File Forensics using Rudra - Ankur Tyagi | * Visual Network and File Forensics using Rudra - Ankur Tyagi |
Revision as of 08:26, 4 October 2016
Talks:
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs * Security through design - Making security better by designing for people - Jelle Niemantsverdriet * Esoteric Web Application Vulnerabilities - Andres Riancho * Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler * Anti-Forensics AF - DualCore
Workshops:
* The Control Things Workshop - Justin Searle * Hacking The Enterprise - Nathan Magniez and Wim Remes * Brewcon - Chris Lytle * Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson * Analyzing Malicious Office Documents - Didier Stevens * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya * Putting a lock around your containers with Docker Security Primitives - Nils De Moor * Visual Network and File Forensics using Rudra - Ankur Tyagi
Final times for talks are still being finalised.