Difference between revisions of "Schedule"
From BruCON 2017
Line 18: | Line 18: | ||
'''Talks:''' | '''Talks:''' | ||
− | * | + | * Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates |
− | * | + | * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam |
− | * | + | * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand |
− | * | + | * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody and Nicholas Carr |
− | * | + | * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil |
− | * | + | * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs |
− | * | + | * Security through design - Making security better by designing for people - Jelle Niemantsverdriet |
− | * | + | * Esoteric Web Application Vulnerabilities - Andres Riancho |
− | * | + | * Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon |
− | * | + | * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos |
− | * | + | * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem |
− | * | + | * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma and Arne Swinnen |
− | * | + | * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, Fabian Fäßler and Abraham Aranguren |
'''Workshops:''' | '''Workshops:''' | ||
− | * | + | * The Control Things Workshop - Justin Searle |
− | * | + | * Hacking The Enterprise - Eden Froemming and Wim Remes |
− | * | + | * Hello Friend: Creating a Threat Intelligence Capability - Rebekah Brown and Scott J Roberts |
− | * | + | * Brewcon - Chris Lytle |
− | * | + | * Hunting Malware with osquery at scale - Nick Anderson, Sereyvathana Ty and Javier Marcos |
− | * | + | * Analyzing Malicious Office Documents - Didier Stevens |
− | * | + | * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout |
− | * | + | * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson |
− | * | + | * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo |
− | * | + | * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya and Solomon Sonya |
− | * | + | * Putting a lock around your containers with Docker Security Primitives - Nils De Moor |
− | * | + | * Visual Network and File Forensics using Rudra - Ankur Tyagi |
Final times for talks are still being finalised. | Final times for talks are still being finalised. |
Revision as of 23:02, 21 June 2016
Talks:
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates * What Does the Perfect Door or Padlock Look Like? - Deviant Ollam * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand * NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody and Nicholas Carr * Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil * Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs * Security through design - Making security better by designing for people - Jelle Niemantsverdriet * Esoteric Web Application Vulnerabilities - Andres Riancho * Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon * Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos * Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem * Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma and Arne Swinnen * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, Fabian Fäßler and Abraham Aranguren
Workshops:
* The Control Things Workshop - Justin Searle * Hacking The Enterprise - Eden Froemming and Wim Remes * Hello Friend: Creating a Threat Intelligence Capability - Rebekah Brown and Scott J Roberts * Brewcon - Chris Lytle * Hunting Malware with osquery at scale - Nick Anderson, Sereyvathana Ty and Javier Marcos * Analyzing Malicious Office Documents - Didier Stevens * Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout * Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson * How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo * 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya and Solomon Sonya * Putting a lock around your containers with Docker Security Primitives - Nils De Moor * Visual Network and File Forensics using Rudra - Ankur Tyagi
Final times for talks are still being finalised.