Schedule

Please find details for all talks here.

Two Days of Trainings (17./18. November)

Workshop 01 Workshop 02 Workshop 03 Workshop 04 Workshop 05
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
Dawid Czagan (Silesia Security Lab)
Open Hardware Hacking
Paula de la Hoz Garrido (Telefonica TECH)
Defending Industrial Control Systems (closed)
Tobias Zillner & Thomas Brandstetter (Limes Security)
Threat Modeling: The Ultimate "Shift Left" (closed)
Irene Michlin & Kreshnik Rexha (IBM)
Open Source Intelligence Gathering on Human Targets
Robert Sell (Trace Labs)
Workshop 06 Workshop 07
Incident Response Detection and Investigation with Open Source Tools (closed)
Thomas Fischer & Craig Jones (FVT SecOps Consulting, Sophos)
Mobile Security Testing Guide Hands-On (closed)
Sven Schleier & Ryan Teoh

All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.

Two Days of Conference (19./20. November)

Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.

Conference, day 1 - Thu, 19 Nov
Left Pirouette Right Pirouette Riding School (ROOTS)
08:00 Registration opens
09:00   DeeSec 2020 Opening
René Pfeiffer (DeepSec Organisation Team)
 
09:10   DevSecBioLawOps and the current State of Information Security
René 'Lynx' Pfeiffer (DeepSec In-Depth Security Conference)
 
10:00   EPP/EDR - Unhooking Their Protections
Daniel Feichter (Strong-IT Innsbruck)
T.B.A.
10:20 How To Combat Risks Directly From Within Your IDE
Christian Schneider (Schneider IT-Security)
   
10:50 Coffee Break
11:10   Improve Your Threat Hunt With Adversary Emulation
Thomas V Fischer (FVT SecOps Consulting)
T.B.A.
11:30 Abusing Azure Active Directory: Who Would You Like To Be Today?
Dr. Nestori Syynimaa (Gerenios Ltd)
   
12:00   Old Pareto had a Chart: How to achieve 80% of Threat Modelling Benefits with 20% of the Efforts
Irene Michlin (IBM)
T.B.A.
12:20 The Great Hotel Hack: Adventures in attacking Hospitality Industry
Etizaz Mohsin
   
12:50 Lunch
14:00   Ransomware: Trends, Analysis and Solutions
Josh Pyorre (Cisco)
Exploiting Interfaces of Secure Encrypted Virtual Machines
Martin Radev (Fraunhofer AISEC)
14:20 Security Model Of Endpoint Devices
Martin Kacer (Mobileum)
   
14:50   DarkCrewBot – The Return Of The Bot Shop Crew
Ori Hamama & Liron Yosefian (Check Point Software Technologies)
A survey on practical adversarial examples for malware classifiers
Daniel Park (Rensselaer Polytechnic Institute (RPI))
15:10 U21: Protecting Mobile Devices from Malware Attacks with a Python IDS
Kamila Babayeva, Sebastian Garcia (Stratosphere Laboratory, Faculty of Electrical Engineering, Czech Technical University)
   
15:40 Coffee Break
16:00   Journey Into Iranian Cyber Espionage
Chris Kubecka (Hypasec)
No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial
Fabrício Ceschin (UFPR - Ciência da Computação)
16:20 Faulting Hardware from Software
Daniel Gruss (Graz University of Technology)
   
16:50   “I Told You So!” – Musings About A Blameless Security Culture
Tim Berghoff, Hauke Gierow (G DATA CyberDefense)
T.B.A.
17:10 Efficient Post-quantum Digital Signature
Maksim Iavich (DeepSec Scholar 2020)
   
17:40  
T.B.A.
T.B.A.
20:00 Speaker's Dinner
Conference, day 2 - Fri, 20 Nov
Left Pirouette Right Pirouette Riding School (ROOTS)
09:00   The Art Of The Breach
Robert Sell (Trace Labs)
T.B.A.
09:20 Street Cred: Fixing Authentication From Passwords To Passwordless
Wolfgang Goerlich (Duo)
   
09:50   Secure Onboarding in the Eclipse Arrowhead Framework
Silia Maksuti (Forschung Burgenland)
T.B.A.
10:10 What's Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis
Shyam Sundar Ramaswami (Lead Threat Researcher - Umbrella Security org - Cisco Systems)
   
10:40 Coffee Break
11:00   Security of Home Automation Systems – A Status Quo Analysis For Austrian Households
Edith Huber, Albert Treytl (Donau-Universität Krems)
T.B.A.
11:20
T.B.A.
   
11:50   Oops! Look twice
Paula de la Hoz Garrido (Telefonica TECH)
T.B.A.
12:10 Scaling A Bug Bounty Program
Catalin Curelaru (Visma)
   
12:40 Lunch
14:00   RedTeamOps
Mert Can Coskuner, Caglar Cakici (Trendyol)
T.B.A.
14:20 No IT Security Without Free Software
Max Mehl (Free Software Foundation Europe)
   
14:50   Am I really becoming a cyborg? Human implants as the next big Security, Privacy and Ethics Debate
Prof. Ulrike Hugl (University of Innsbruck)
T.B.A.
15:10 Caught in the Middle with You: Examining the Implications of Adversary Midpoint Collection
Joe Slowik (Dragos Inc, Paralus LLC)
   
15:40 Coffee Break
16:00   Through the Looking-Glass, And What A Hacker Found There
Mario Valori (Vergilie)
T.B.A.
16:20 Practical Mobile App Attacks By Example
Abraham Aranguren (7ASecurity)
   
16:50   Pivoting - As an Attack Weapon
Filipi Pires (-)
T.B.A.
17:10 TaintSpot: Practical Taint Analysis and Exploit Generation for Java
Dr. -Ing. Mohammadreza Ashouri (University of Potsdam)
   
17:40
T.B.A.
T.B.A.
T.B.A.
18:20 Closing Ceremony
18:30 - .:.
19:00 - T.B.A.