SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
Line 141: Line 141:
 
| height="64" | 18:00
 
| height="64" | 18:00
 
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]
 
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]
| rowspan="2" | [[Presentations#The_Frogs_Who_Desired_A_King:_A_Virtualization_and_Cloud_Computing_Security_Fable_Set_To_Interpretive_Dance | The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance ]]
+
| rowspan="2" | [[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]
  
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"

Revision as of 21:44, 3 September 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Friday 18th Saturday 19th
Hour Speaker Track Workshop Track #1 Workshop Track #2 The Hex Factor Speaker Track Workshop Track #1 Workshop Track #2 The Hex Factor
9:00 Trusted Cryptography - Lockpicking #1 The Hex Factor Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2 The Hex Factor
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 Digital ID #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk Soldering workshop Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies Red and Tiger Team
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Malicious Markup - I thought you were my friend - cycle 3 Lockpicking #2 Soldering workshop
17:30
18:00 Building Hackerspaces Everywhere The Belgian Beer Lovers Guide to Cloud Security
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty End
20:30
21:00       THF @ HSB  


21:30        
22:00        
22:30        
23:00        
23:30        
0:00