Schedule
Please find details for all talks here.
Two Days of Trainings (18./19. November)
Workshop 1 | Workshop 2 | Workshop 3 | Workshop 4 | Workshop 5 | Workshop 6 | Workshop 7 | Workshop A | Workshop B | Workshop C |
---|---|---|---|---|---|---|---|---|---|
Hacking IoT Hardware: The Frugal Way Hrishikesh Somchatwar & Arun Mane (Amynasec Labs) |
Factory Under Siege: Red and Blue Team Tactics in Operational Technology Sarah Mader (NVISO) |
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation Dawid Czagan (Silesia Security Lab) |
Becoming the Godfather of Threat Modeling Mike van der Bijl (Scyon) |
eCrime Intelligence Aaron Aubrey Ng & Scott Jarkoff (CrowdStrike) |
The Mobile Playbook - A Guide to iOS and Android App Security (hybrid - in person or online) Sven Schleier (Bai7 Consulting) |
Social Engineering & Open-source Intelligence for Security Teams Christina Lekati (Cyber Risk GmbH) |
SAP Cyber Security 101 (18.11 One Day Training) Andreas Wiegenstein (CAIBERP GmbH) |
T.B.A. |
T.B.A. |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (20./21. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 20 Nov
Track 2 (Strassburg) | Track 1 (Paris) | Tech Track / Workshops | |
---|---|---|---|
08:00 | Registration opens | ||
09:00 | T.B.A. |
||
09:10 | T.B.A. |
||
10:00 | JWT Puzzles – A Unique Large-Scale Application Attack for Red Teams engagements Alon Friedman (Self-Security Researcher and Principal Security Architect at Microsoft) |
Man-In-The-Service: Truly OpSec Safe Relay Techniques Tobia Righi (-) |
T.B.A. |
10:50 | Coffee Break | ||
11:10 | Déjà Vu with Scattered Spider: Are Your SaaS Doors Still Unlocked? Andi Ahmeti & Abian Morina (Permiso Security) |
Zero to Owned: Mapping the Lifecycle of a Credential Stealer to Corporate Breach Danish Tariq & Hassan Khan Yusufzai (Laburity) |
T.B.A. |
12:00 | Malware Analysis as an Incident Responder - Ain't Nobody Got Time Fo' Dat Stephan Berger (InfoGuard AG) |
Ransomware vs. Info Stealers: A Comparative Analysis Steph Shample (S2 Advising) |
T.B.A. |
12:50 | Lunch | ||
14:00 | Trusted Software by Design : Lessons Learned Muhammad Taimoor Khan (University of Greenwich) |
Lessons learned from preparedness exercises with 3500 companies Erlend Andreas Gjære (Secure Practice) |
T.B.A. |
14:50 | Network Fingerprinting with Passive and Active Techniques Erik Hjelmvik and Jonas Lejon (Erik: Netresec, Jonas: Triop) |
The Security Brain – Why it‘s so hard for humans to act secure Klaudia Zotzmann-Koch & Christina Beran (self employed, otherwise CCC) |
T.B.A. |
15:40 | Coffee Break | ||
16:00 | Spotter – Universal Kubernetes Security Engine Madhu Akula (Madhu Akula) |
GitHub Security at Scale: One Opensource Tool to Rule Them All Sina Yazdanmehr & Hugo Baccino (Aplite GmbH) |
T.B.A. |
16:50 | L.E.E.C.H - Lazy Entity Exploits Cursed Hosts Nikolaos Tsapakis (Epignosis Learning Technologies) |
From IRC to the Boardroom Alyssa Miller (Epiq Global) |
T.B.A. |
17:40 | Android Malware Detection Through an Integrated System Using Permission-to-Exploitation Associations Professor Dr. Habil. Razvan Bocu (Transilvania University of Brasov, Department of Mathematics and Computer Science, Romania) |
The Anatomy of DragonRank: Understanding and Defending Against SEO-Driven IIS Compromises Joey Chen (Cisco Talos) |
T.B.A. |
20:00 | Speaker's Dinner |