Please find details for all talks here.

Two Days of Trainings (19./20. November)

Workshop 1 Workshop 2 Workshop 3 Workshop 4 Workshop 5
Attacks On GSM Networks
Dieter Spaar & Harald Welte (Independent Researcher & HMW-Consulting)
Social Engineering Awareness Training - One Day Training Course
Sharon Conheady & Martin Law (First Defence)
Exploiting Web Applications Protected By $WAFs
Florian Brunner (Holistic Security Consulting GmbH / Board Member OWASP Austria)
Effective IDS/IPS Auditing And Testing With Finux
Arron Finux Finnon (Alba13 Research Labs)
Hands On Exploit Development
Georgia Weidman (Bulb Security LLC)
Workshop 6 Workshop 7 Workshop 8 Workshop 9
Analyzing Internet Attacks With Honeypots
Ioannis Koniaris (Aristotle University of Thessaloniki / Pheron Ltd)
Developing and Using Cybersecurity Threat Intelligence
John Bambenek (Bambenek Consulting / SANS Internet Storm Center)
Mobile Application – Scan, Attack and Exploit
Hemil Shah (eSphere Security Solutions Pvt Ltd)
Secure your Business by Business Continuity Plans – One Day Training Course
Michel Wolodimiroff (Consultant, IT Expert Safety and Security)

All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.

Two Days of Conference (21./22. November)

Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.

Conference, day 1 - Thu, 21 Nov
Left Pirouette Right Pirouette
08:00 Registration opens
09:00   Welcome To DeepSec 2013
Michael Kafka & René Pfeiffer (DeepSec Organisation Team)
09:10   Cultural Learning Of China To Make Benefit Glorious Profession Of Infosec
Wim Remes (IOActive Ltd, (ISC)2, BruCON)
10:00 Psychology of Security: a Research Programme
Stefan Schumacher (Magdeburger Institut für Sicherheitsforschung)
Hackanalytics: what's hot, what's not
Alexey Kachalin (Advanced Monitoring)
10:50 Coffee Break
11:10 Relax Everybody: HTML5 Is Securer Than You Think
Sebastian Lekies (SAP AG)
From Misconceptions To Failure – Security And Privacy In The US Cloud Computing FedRAMP Program
Mikhail A. Utin (Rubos, Inc.)
12:00 spin: Static Instrumentation For Binary Reverse-Engineering
David Guillen Fandos
Risk Assessment For External Vendors
Luciano Ferrari
12:50 Lunch
14:00 Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities
Arron Finux Finnon (Alba13 Research Labs)
My Name Is Hunter, Ponmocup Hunter
Tom Ueltschi (Swiss Post)
14:50 Effective IDS Testing – The OSNIF's Top 5
Arron 'Finux' Finnon (Alba13 Research Labs)
Easy Ways To Bypass AntiVirus Systems
Attila Marosi (GovCERT-Hungary)
15:40 Coffee Break
16:00 Hacking Medical Devices
Florian Grunow (ERNW GmbH)
Prism Break – The Value Of Online Identities.
Frank Ackermann (-)
16:50 Auditing Virtual Appliances - An Untapped Source Of 0-days
Stefan Viehböck (SEC Consult)
Hack The Gibson: Exploiting Supercomputers
John Fitzpatrick (MWR InfoSecurity)
17:40 Cracking And Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage.
Vladimir Katalov (ElcomSoft Co. Ltd.)
The Economics Of False Positives
Gavin 'Jac0byterebel' Ewan (Alba13 Research Labs)
20:00 Speaker's Dinner
Conference, day 2 - Fri, 22 Nov
Left Pirouette Right Pirouette
09:00 Uncovering your trails. Privacy issues of bluetooth devices.
Verónica Valeros & Garcia Sebastian (MatesLab Hackspace)
Pivoting In Amazon Clouds
Andres Riancho (-)
09:50 Building The First Android IDS On Network Level
Jaime Sánchez (-)
Future Banking And Financial Attacks
Konstantinos Karagiannis (BT)
10:40 Coffee Break
11:00 Trusted Friend Attack: Guardian Angels Strike
Ashar Javed (Chair of Network & Data Security, Ruhr University Bochum, Germany)
Static Data Leak Prevention In SAP - The Next Generation Of DLP
Andreas Wiegenstein (Virtual Forge GmbH)
11:50 Malware Datamining And Attribution
Michael Boman (Independent Researcher)
Mutually Assured Pwnage
Karin Kosina
12:40 Lunch
14:00 The Boomerang Effect – Using Session Puzzling To Attack Apps From The Backend
Shay Chen (Hacktics ASC, Ernst & Young)
Europe In The Carna Botnet: Telnet's Threat To The Largest Economy
Parth Shukla (AusCERT (Australian Computer Emergency Response Team))
14:50 Top 10 Security Mistakes In Software
Peter af Geijerstam (Factor10)
Using Memory, Filesystems And Runtime To App Pen iOS And Android
Andre Gironda
15:40 Coffee Break
16:00 Mobile Fail: Cracking Open "Secure" Android Containers
Chris John Riley (Raiffeisen Informatik)
Applied Crypto Hardening
Aaron Kaplan (, DI Ramin Sabet, Daniel Kovacic
16:50 Bypassing Security Controls With Mobile Devices
Georgia Weidman (Bulb Security LLC)
Automation In Android & iOS Application Security Review
Hemil Shah (eSphere Security Solutions Pvt Ltd)
17:40 CSRFT - A Cross Site Request Forgeries Toolkit
Paul Amar (Student)
The Dark Side of the Internet
Moritz Schafhuber
18:20 Closing Ceremony
20:00 - Party & Networking at Metalab, Rathausstrasse 6, 1010 Wien