Schedule
Please find details for all talks here.
Two Days of Trainings (19./20. November)
Workshop 1 | Workshop 2 | Workshop 3 | Workshop 4 | Workshop 5 |
---|---|---|---|---|
Attacks On GSM Networks Dieter Spaar & Harald Welte (Independent Researcher & HMW-Consulting) |
Social Engineering Awareness Training - One Day Training Course Sharon Conheady & Martin Law (First Defence) |
Exploiting Web Applications Protected By $WAFs Florian Brunner (Holistic Security Consulting GmbH / Board Member OWASP Austria) |
Effective IDS/IPS Auditing And Testing With Finux Arron Finux Finnon (Alba13 Research Labs) |
Hands On Exploit Development Georgia Weidman (Bulb Security LLC) |
Workshop 6 | Workshop 7 | Workshop 8 | Workshop 9 |
---|---|---|---|
Analyzing Internet Attacks With Honeypots Ioannis Koniaris (Aristotle University of Thessaloniki / Pheron Ltd) |
Developing and Using Cybersecurity Threat Intelligence John Bambenek (Bambenek Consulting / SANS Internet Storm Center) |
Mobile Application – Scan, Attack and Exploit Hemil Shah (eSphere Security Solutions Pvt Ltd) |
Secure your Business by Business Continuity Plans – One Day Training Course Michel Wolodimiroff (Consultant, IT Expert Safety and Security) |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (21./22. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 21 Nov
Conference, day 2 - Fri, 22 Nov
Left Pirouette | Right Pirouette | |
---|---|---|
09:00 | Uncovering your trails. Privacy issues of bluetooth devices. Verónica Valeros & Garcia Sebastian (MatesLab Hackspace) |
Pivoting In Amazon Clouds Andres Riancho (-) |
09:50 | Building The First Android IDS On Network Level Jaime Sánchez (-) |
Future Banking And Financial Attacks Konstantinos Karagiannis (BT) |
10:40 | Coffee Break | |
11:00 | Trusted Friend Attack: Guardian Angels Strike Ashar Javed (Chair of Network & Data Security, Ruhr University Bochum, Germany) |
Static Data Leak Prevention In SAP - The Next Generation Of DLP Andreas Wiegenstein (Virtual Forge GmbH) |
11:50 | Malware Datamining And Attribution Michael Boman (Independent Researcher) |
Mutually Assured Pwnage Karin Kosina |
12:40 | Lunch | |
14:00 | The Boomerang Effect – Using Session Puzzling To Attack Apps From The Backend Shay Chen (Hacktics ASC, Ernst & Young) |
Europe In The Carna Botnet: Telnet's Threat To The Largest Economy Parth Shukla (AusCERT (Australian Computer Emergency Response Team)) |
14:50 | Top 10 Security Mistakes In Software Peter af Geijerstam (Factor10) |
Using Memory, Filesystems And Runtime To App Pen iOS And Android Andre Gironda |
15:40 | Coffee Break | |
16:00 | Mobile Fail: Cracking Open "Secure" Android Containers Chris John Riley (Raiffeisen Informatik) |
Applied Crypto Hardening Aaron Kaplan (CERT.at), DI Ramin Sabet, Daniel Kovacic |
16:50 | Bypassing Security Controls With Mobile Devices Georgia Weidman (Bulb Security LLC) |
Automation In Android & iOS Application Security Review Hemil Shah (eSphere Security Solutions Pvt Ltd) |
17:40 | CSRFT - A Cross Site Request Forgeries Toolkit Paul Amar (Student) |
The Dark Side of the Internet Moritz Schafhuber |
18:20 | Closing Ceremony | |
20:00 - ∞ | Party & Networking at Metalab, Rathausstrasse 6, 1010 Wien |