Track 2 (hax) | Track 1 (infosec) | Workshop Room | |
0800 | Registration & Breakfast | ||
0830 | init 5 – Intro Presentation | ||
0900 | Pretending To Be A Terrorist – Steve Stasiukonis |
Enterprise Class Vulnerability Management like a Boss – Rockie Brockway | SDR Workshop – JonSzymaniak & Alex Page |
0930 | |||
1000 | Tackling the Hard Problem of Surveillance: Toward Privacy Protecting Protocols – Robert Olson |
Accidentally Awesome: How You Might Already Be an Effective Pentester – Mike Lisi |
|
1030 | |||
1100 | Big Game Hunting: Internet Data and You – Silas Cutler | Own The Con – BSidesROC Staff | |
1130 | breakdown | ||
1200 | Lunch | ||
1230 | |||
1300 | Exploring Layer 2 Network Security in Virtualized Environments – DHCP Attacks – Ronny Bull |
setup | Tor Research Workshop – Antitree |
1330 | Practical GPG – algorythm | ||
1400 | Multipath TCP – Breaking Today’s Networks with Tomorrow’s Protocols – Kate Pearce | Know Thy Enemy – Web Attacker Attribution – Chaim Sanders | |
1430 | |||
1500 | Hacking Embdedded Devices – Nolan Ray | IPLOG? A beginner’s IDS for the WIN! – Nathan Gibbs | |
1530 | |||
1600 | Key Signing / Mixer | Lightning Talks | breakdown |
1630 | |||
1700 | closedown – Outro Presentation | ||
1800 | breakdown | ||
1900 | init 0 – shutdown |