SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
(Schedule)
Line 13: Line 13:
  
 
{| border='1px'
 
{| border='1px'
 +
|- style="font-size:11pt;font-weight:bold" align="center"
 +
|
 +
| colspan="3" | Friday 18th
 +
| colspan="3" | Saturday 19th
 +
 
|- style="font-size:11pt;font-weight:bold" align="center"
 
|- style="font-size:11pt;font-weight:bold" align="center"
 
| width="94" height="15" | Hour
 
| width="94" height="15" | Hour

Revision as of 23:22, 6 July 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Friday 18th Saturday 19th
Hour Speaker Track Workshop Track #1 Workshop Track #2 Speaker Track Workshop Track #1 Workshop Track #2
9:00 Trusted Cryptography Digital ID #1 Physical Locks #1 Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Malicious Markup - I thought you were my friend - cycle 3 Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk TBD Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies TBD Red and Tiger Team TBD
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Physical Locks #2 TBD
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty
20:30
21:00      
21:30      
22:00      
22:30      
23:00      
23:30      
0:00