Rochester's Hacker Conference
BSidesROC
Blog
schedule
events
sponsors
about
tickets
Archive
Schedule
┗
Talks
Schedule
Time
Track 1
Track 2
Track 3
800
Registration
830
Opening Remarks
900
Detect Me If You Can
Building the Panopticon: Centralized Logging and Alerting With Free Tools
Easily Deploying and Optimizing Open Source Web Application Firewalls
930
Ducky-in-the-middle: Injecting keystrokes into plaintext protocols
1000
How the Cookie Crumbles: Modern HTTP State Persistence
Learn How to Expect the Unexpected: Unusual & Unexpected Findings in Incident Response
Virtualization Based Security Strengths and Weaknesses
1030
Sentry or: How I Learned to Stop Worrying and Delete My Accounts
1100
Keynote
1130
1200
Lunch Break
1230
1300
Turning Domain Data into Domain Intelligence
Rise of the Miners
IoT Devices - And why they desperately need help.
1330
IoT Botnet Detection System using Machine Learning
1400
IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics
Red and Blue Ping Pong
Civic and Humanitarian Open Source
1430
BinDbg: Easy Windows Debugging for Binary Ninja
1500
Pentesting DevOps: Attacking Containers and Container Orchestration
Open source SAST and DAST tools for web app pen testing
How to "hack" point of sale systems
1530
Lightning Talks
1600
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
Top SIEM Rules You Should Implement Today
1630
1700
Closing Remarks
1730
1800
Other formats:
JSON
Full Program