SOURCE Boston 2014 - Tuesday, April 8
12:00
Aitel
Keynote (Tuesday)
13:00
Lee
How to Implement New Security Features and Fix Broken Stuff with Feature Flags and A/B Tests
Butterworth, Cornwell, Kovah
Setup for Failure: Defeating SecureBoot
Melancon
Diablo Security: What Can Infosec Learn from Video Games?
14:00
Cornell
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together
Boyer
Measuring Security Outcomes: From Data to Insight for Third Party Risk Management
Ahlberg
Top 50 Non-State Hacker Groups of the World
15:30
Ellis
Reverse Engineering the Human OS
Chenette
Offensive Defense through Attacker Mimicry
Miller
Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Economic & Social Systems
16:30
Wardle
iOS App Reversing; a Practical Approach
Troutman
Mackerel: A Progressive School of Cryptographic Thought
Nye
Risk, Audit, and Compliance for Hackers & Defenders
SOURCE Boston 2014 - Wednesday, April 9
10:00
Schneier
Keynote (Wednesday)
11:00
Pfost
Case Study: How to Build an Application Security Metrics Program
Behrens, Hoernecke
Trapping Hacks With Ensnare
Asadoorian
Hacking The US Trademark System: A Cautionary Tale
13:30
Doherty
Security Testing WITHOUT an Army of Ninjas
Thompson, Widup
Ripped from the Headlines: What the news tells us about Information Security Incidents
Ottenheimer
Delivering Security at Big Data Scale
14:30
Cheyne, Rudis
Speed Networking
Cucinelli, Ellis, Knowlton
Hiring/Recruitment Workshop
16:00
Meyer
Reality Checking Your Security Testing Program
Darley, Millar, Wilson, Wunder
Information-sharing Tools, Taxonomies, and Trust: Babel or Better?
Crouse
The Privileged User Discussion: Security Enforcer or Threat?
17:00
Ross
URL Scheme Security on iOS
Crowley
How to Save the Environment, or Why Nobody Takes Your Security Advice
Goerlich
Aligning Threats and Allies through Stories
SOURCE Boston 2014 - Thursday, April 10
10:00
Matwyshyn
Keynote (Thursday)
11:00
Mayer
Introducing idb - Simplified Blackbox iOS App Pentesting
Wallach
Too Many Fallen: #SecBurnOut Pt3 "Prevention & Introspection"
Ellis
5,500 hackers + Your code = ???
13:30
Mahjoub
Marauder or Scanning your DNSDB for Fun and Profit
Corman, Ellis, Woods
The Cavalry Isn't Coming; It Falls To Us: How you can help!
Amit
Painting A Company Red and Blue
14:30
Augliere
IT Security Risk Assessment:Measuring What Matters
Lanier, Stanislav
The Internet of Things: We've Got to Chat
Jaquith
Applied Security Metrics: Building the Financial Services Threat Report
15:45
Wait Wait Don't Pwn Me!
16:45
Raffle Prizes and Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.