Schedule
Please find details for all talks here.
Two Days of Trainings (17./18. November)
| Workshop 01 | Workshop 02 | Workshop 03 | Workshop 04 | Workshop 05 |
|---|---|---|---|---|
| Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation Dawid Czagan (Silesia Security Lab) |
Open Hardware Hacking Paula de la Hoz Garrido (Telefonica TECH) |
Defending Industrial Control Systems (closed) Tobias Zillner & Thomas Brandstetter (Limes Security) |
Threat Modeling: The Ultimate "Shift Left" (closed) Irene Michlin & Kreshnik Rexha (IBM) |
Open Source Intelligence Gathering on Human Targets Robert Sell (Trace Labs) |
| Workshop 06 | Workshop 07 |
|---|---|
| Incident Response Detection and Investigation with Open Source Tools (closed) Thomas Fischer & Craig Jones (FVT SecOps Consulting, Sophos) |
Mobile Security Testing Guide Hands-On (closed) Sven Schleier & Ryan Teoh |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (19./20. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 19 Nov
| Left Pirouette | Right Pirouette | Riding School (ROOTS) | |
|---|---|---|---|
| 08:00 | Registration opens | ||
| 09:00 | DeeSec 2020 Opening René Pfeiffer (DeepSec Organisation Team) |
||
| 09:10 | DevSecBioLawOps and the current State of Information Security René 'Lynx' Pfeiffer (DeepSec In-Depth Security Conference) |
||
| 10:00 | EPP/EDR - Unhooking Their Protections Daniel Feichter (Strong-IT Innsbruck) |
T.B.A. |
|
| 10:20 | How To Combat Risks Directly From Within Your IDE Christian Schneider (Schneider IT-Security) |
||
| 10:50 | Coffee Break | ||
| 11:10 | Improve Your Threat Hunt With Adversary Emulation Thomas V Fischer (FVT SecOps Consulting) |
T.B.A. |
|
| 11:30 | Abusing Azure Active Directory: Who Would You Like To Be Today? Dr. Nestori Syynimaa (Gerenios Ltd) |
||
| 12:00 | Old Pareto had a Chart: How to achieve 80% of Threat Modelling Benefits with 20% of the Efforts Irene Michlin (IBM) |
T.B.A. |
|
| 12:20 | The Great Hotel Hack: Adventures in attacking Hospitality Industry Etizaz Mohsin |
||
| 12:50 | Lunch | ||
| 14:00 | Ransomware: Trends, Analysis and Solutions Josh Pyorre (Cisco) |
Exploiting Interfaces of Secure Encrypted Virtual Machines Martin Radev (Fraunhofer AISEC) |
|
| 14:20 | Security Model Of Endpoint Devices Martin Kacer (Mobileum) |
||
| 14:50 | DarkCrewBot – The Return Of The Bot Shop Crew Ori Hamama & Liron Yosefian (Check Point Software Technologies) |
A survey on practical adversarial examples for malware classifiers Daniel Park (Rensselaer Polytechnic Institute (RPI)) |
|
| 15:10 | U21: Protecting Mobile Devices from Malware Attacks with a Python IDS Kamila Babayeva, Sebastian Garcia (Stratosphere Laboratory, Faculty of Electrical Engineering, Czech Technical University) |
||
| 15:40 | Coffee Break | ||
| 16:00 | Journey Into Iranian Cyber Espionage Chris Kubecka (Hypasec) |
No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Fabrício Ceschin (UFPR - Ciência da Computação) |
|
| 16:20 | Faulting Hardware from Software Daniel Gruss (Graz University of Technology) |
||
| 16:50 | “I Told You So!” – Musings About A Blameless Security Culture Tim Berghoff, Hauke Gierow (G DATA CyberDefense) |
T.B.A. |
|
| 17:10 | Efficient Post-quantum Digital Signature Maksim Iavich (DeepSec Scholar 2020) |
||
| 17:40 | T.B.A. |
T.B.A. |
|
| 20:00 | Speaker's Dinner | ||
Conference, day 2 - Fri, 20 Nov
| Left Pirouette | Right Pirouette | Riding School (ROOTS) | |
|---|---|---|---|
| 09:00 | The Art Of The Breach Robert Sell (Trace Labs) |
T.B.A. |
|
| 09:20 | Street Cred: Fixing Authentication From Passwords To Passwordless Wolfgang Goerlich (Duo) |
||
| 09:50 | Secure Onboarding in the Eclipse Arrowhead Framework Silia Maksuti (Forschung Burgenland) |
T.B.A. |
|
| 10:10 | What's Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Shyam Sundar Ramaswami (Lead Threat Researcher - Umbrella Security org - Cisco Systems) |
||
| 10:40 | Coffee Break | ||
| 11:00 | Security of Home Automation Systems – A Status Quo Analysis For Austrian Households Edith Huber, Albert Treytl (Donau-Universität Krems) |
T.B.A. |
|
| 11:20 | T.B.A. |
||
| 11:50 | Oops! Look twice Paula de la Hoz Garrido (Telefonica TECH) |
T.B.A. |
|
| 12:10 | Scaling A Bug Bounty Program Catalin Curelaru (Visma) |
||
| 12:40 | Lunch | ||
| 14:00 | RedTeamOps Mert Can Coskuner, Caglar Cakici (Trendyol) |
T.B.A. |
|
| 14:20 | No IT Security Without Free Software Max Mehl (Free Software Foundation Europe) |
||
| 14:50 | Am I really becoming a cyborg? Human implants as the next big Security, Privacy and Ethics Debate Prof. Ulrike Hugl (University of Innsbruck) |
T.B.A. |
|
| 15:10 | Caught in the Middle with You: Examining the Implications of Adversary Midpoint Collection Joe Slowik (Dragos Inc, Paralus LLC) |
||
| 15:40 | Coffee Break | ||
| 16:00 | Through the Looking-Glass, And What A Hacker Found There Mario Valori (Vergilie) |
T.B.A. |
|
| 16:20 | Practical Mobile App Attacks By Example Abraham Aranguren (7ASecurity) |
||
| 16:50 | Pivoting - As an Attack Weapon Filipi Pires (-) |
T.B.A. |
|
| 17:10 | TaintSpot: Practical Taint Analysis and Exploit Generation for Java Dr. -Ing. Mohammadreza Ashouri (University of Potsdam) |
||
| 17:40 | T.B.A. |
T.B.A. |
T.B.A. |
| 18:20 | Closing Ceremony | ||
| 18:30 - ∞ | .:. | ||
| 19:00 - ∞ | T.B.A. | ||

