Schedule
Please find details for all talks here.
Two Days of Trainings (18./19. November)
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (20./21. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 20 Nov
Track 2 (Strassburg) | Track 1 (Paris) | Tech Track / Workshops | |
---|---|---|---|
08:00 | Registration opens | ||
09:00 | T.B.A. |
||
09:10 | T.B.A. |
||
10:00 | JWT Puzzles – A Unique Large-Scale Application Attack for Red Teams engagements Alon Friedman (Self-Security Researcher and Principal Security Architect at Microsoft) |
Man-In-The-Service: Truly OpSec Safe Relay Techniques Tobia Righi (-) |
T.B.A. |
10:50 | Coffee Break | ||
11:10 | Déjà Vu with Scattered Spider: Are Your SaaS Doors Still Unlocked? Andi Ahmeti & Abian Morina (Permiso Security) |
Zero to Owned: Mapping the Lifecycle of a Credential Stealer to Corporate Breach Danish Tariq & Hassan Khan Yusufzai (Laburity) |
T.B.A. |
12:00 | T.B.A. |
Ransomware vs. Info Stealers: A Comparative Analysis Steph Shample (S2 Advising) |
T.B.A. |
12:50 | Lunch | ||
14:00 | Trusted Software by Design : Lessons Learned Muhammad Taimoor Khan (University of Greenwich) |
Lessons learned from preparedness exercises with 3500 companies Erlend Andreas Gjære (Secure Practice) |
T.B.A. |
14:50 | The Security Brain – Why it‘s so hard for humans to act secure Klaudia Zotzmann-Koch & Christina Beran (self employed, otherwise CCC) |
Predicting the Cyberoffensive Capabilities of Nations: A Framework Matthieu J. Guitton (Université Laval) |
T.B.A. |
15:40 | Coffee Break | ||
16:00 | Spotter – Universal Kubernetes Security Engine Madhu Akula (Madhu Akula) |
GitHub Security at Scale: One Opensource Tool to Rule Them All Sina Yazdanmehr & Hugo Baccino (Aplite GmbH) |
T.B.A. |
16:50 | L.E.E.C.H - Lazy Entity Exploits Cursed Hosts Nikolaos Tsapakis (Epignosis Learning Technologies) |
From IRC to the Boardroom Alyssa Miller (Epiq Global) |
T.B.A. |
17:40 | Android Malware Detection Through an Integrated System Using Permission-to-Exploitation Associations Professor Dr. Habil. Razvan Bocu (Transilvania University of Brasov, Department of Mathematics and Computer Science, Romania) |
The Anatomy of DragonRank: Understanding and Defending Against SEO-Driven IIS Compromises Joey Chen (Cisco Talos) |
T.B.A. |
20:00 | Speaker's Dinner |