| Track 2 (hax) | Track 1 (infosec) | Workshop Room | |
| 0800 | Registration & Breakfast | ||
| 0830 | init 5 – Intro Presentation | ||
| 0900 | Pretending To Be A Terrorist – Steve Stasiukonis |
Enterprise Class Vulnerability Management like a Boss – Rockie Brockway | SDR Workshop – JonSzymaniak & Alex Page |
| 0930 | |||
| 1000 | Tackling the Hard Problem of Surveillance: Toward Privacy Protecting Protocols – Robert Olson |
Accidentally Awesome: How You Might Already Be an Effective Pentester – Mike Lisi |
|
| 1030 | |||
| 1100 | Big Game Hunting: Internet Data and You – Silas Cutler | Own The Con – BSidesROC Staff | |
| 1130 | breakdown | ||
| 1200 | Lunch | ||
| 1230 | |||
| 1300 | Exploring Layer 2 Network Security in Virtualized Environments – DHCP Attacks – Ronny Bull |
setup | Tor Research Workshop – Antitree |
| 1330 | Practical GPG – algorythm | ||
| 1400 | Multipath TCP – Breaking Today’s Networks with Tomorrow’s Protocols – Kate Pearce | Know Thy Enemy – Web Attacker Attribution – Chaim Sanders | |
| 1430 | |||
| 1500 | Hacking Embdedded Devices – Nolan Ray | IPLOG? A beginner’s IDS for the WIN! – Nathan Gibbs | |
| 1530 | |||
| 1600 | Key Signing / Mixer | Lightning Talks | breakdown |
| 1630 | |||
| 1700 | closedown – Outro Presentation | ||
| 1800 | breakdown | ||
| 1900 | init 0 – shutdown | ||


