Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
CV Clinic and Roundtables 10:00 - 13:00
Introduction and Kick Off 10:00 - 10:05
Targeted CV writing when entering or changing fi...
Breakout/Workshop – CV/LinkedIn Profile
Working with a recruiter: Mythbuster. What a ‘go...
Breakout - Interview techniques... 11:35 - 12:05
Needle in a haystack: Tips and tricks to get you...
Breakout - Ask the expert panel... 12:30 - 13:00
LUNCH 13:00 - 14:30
Lightning Track PUB! 14:30 - 17:30
'How the f**k do I get in? One woman's struggle...
Profiling Malicious Actors (Working Title)
Awareness about behavior online, how to build it
Think about the box 11:25 - 11:40
BREAK 11:45 - 12:00
Security Monitoring: Avoiding 'Oh Sh*t' Moments
Droid Reversal for 'Civilians'
IPv6 for Pentesters 12:45 - 13:00
LUNCH 13:00 - 14:40
Forensic Analysis of Natural Language Texts
The state of crypto APIs 15:05 - 15:20
Brazilian Bandits: Cybercrime in Brazil
Malware Analysis 101 15:45 - 16:00
Ignorance is bliss - does privacy matter?
Whodunnit: The art of attribution
Panning for Coin: Small-time Currency Mining Bot...
The use of SMT solvers in IT security
Running Circles On Social Media - Intelligent OS...
Opening Remarks 08:45 - 09:00
[Keynote] Freaky Leaks from a Chic Geek 09:00 - 10:00
Introducing Pi-Key: Hacking just like the Movies 10:00 - 10:45
BREAK 10:45 - 11:15
WiFi-based IMSI Catcher 11:15 - 12:05
Secure Communications 12:10 - 13:00
[NOT FILMED] Alexa's top 1M domains - the state of we... 14:30 - 15:20
Enemies of the West 15:25 - 16:10
BREAK 16:10 - 16:45
A look at TR-06FAIL and other CPE Configuration... 16:45 - 17:30
Closing Ceremony 17:30 - 18:00
Connecting the dots! 10:00 - 10:45
[NOT FILMED] How storytelling made me a better infose... 11:15 - 12:05
Sharing is not caring: Proliferation of GitHub code i... 12:10 - 13:00
Holy smokes, how to vape yourself to root 14:30 - 15:20
Hunt Or Be Hunted 15:25 - 16:10
Truly Anonymous Credentials Using Modern Cryptog... 16:45 - 17:30
Session 1 Web Hacking 101 with Porthunter @porthunter 10:00 - 12:15
Session 2 Making Infosec YouTube Videos with Javvad Malik @J4vv4D and Leigh-Anne Galloway 12:30 - 15:00
Session 3 Leveraging Global Datasets to Improve Your Cyber Inves... 15:15 - 16:15
Session 1 Dynamic Stink Lie Berry's with John Carroll @n0x00 10:00 - 11:00
Session 2 Red Teaming with PoshC2 with Ben Turner & Phil Lynch ( @benpturner & @plynch98 ) 11:15 - 13:30
Session 3 Malware Funalysis: Networking (mostly) with PATH 14:00 - 15:00
Session 4 Breaking Apps with Frida with Jahmel Harris @JayHarris_Sec 15:15 - 17:30
Session 1 Saving time and effort with security tools and solutions on the BSDs with Sevan Janiyan @sevanjaniyan 10:00 - 12:15
Session 2 From zero to hero with Scott Helme @Scott_Helme 12:30 - 15:00
Session 3 Introduction to Logical Windows Privilege Escalation with James Foreshaw @tiraniddo 15:15 - 17:30