SOURCE Boston 2016 - Wednesday, May 18
08:30
Opening Remarks
09:00
Thieme
Play Through the Pain? - The Impact of Forbidden Knowledge on Security and Intelligence Professionals
09:45
Speed Networking
10:45
Cheyne, Thieme
Workshop
Costa, Silva
Improving your protection by automating real world attacks
Peterson
Defending the Cloud from the Full Stack Hack
11:35
Carlson, Reiter
Role Playing with Intermediate Representations
Cooprider
How security changes in the cloud and why you care
13:30
Ellis, Feinblum
The Art of Crisis Management
Contos
Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them
McSweeney
DGA Antivenom: Stopping new configurations before analysis
14:20
Hurlbut
Developing a Threat Modeling Mindset
Schmidt
The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices
15:35
Coles, Ward
Upstream without a paddle - lessons learnt!
Mannino
Don’t Touch Me That Way
Chase, Coley
Toward Consistent, Usable Security Risk Assessment of Medical Devices
16:30
Nickerson
Nightmares of a Pentester
17:30
Attendee Reception
19:00
Evening Networking Reception
SOURCE Boston 2016 - Thursday, May 19
09:00
Diamond
10 Words to Stop Using Now
10:00
Diamond
10 Words to Stop Using Now (Workshop)
Hay
Bootstrapping A Security Research Project
Holub
Deconstructing The Cyber Kill Chain of Angler Campaign
10:50
Gururangan, Rudis
The Topology of Malicious Activity in IPv4
Herzberg
Emerald City of Cyber Security
11:40
Chow, Wattanasin
The Cybersecurity Education Gap - What Do We Do Now?
Roytman
Mr. Human - Vulnerability Management from the Attacker’s Perspective
Poulin
httpillage: calling all nodes
13:20
Carielli, Cleary
Talk Security to Me: Case Studies for Communicating Security Issues
Amit
Social Media Risk Metrics
Garbis
Why is Network Access Control So Hard? Is there a Better Way?
14:10
Morency
Making Change from Assessments that is not just Monetary
Miessler
Key Attribute Risk Management and Analysis (KARMA)
Li, Luo
Side Channel Defense with Intel Cache Allocation Technique
15:10
Plunkett
Learning from Crises: Roles, Risks, and Rewards on the Road to Recovery
16:00
Personal Development Panel
16:45
Lightning Talks
17:30
Raffle Prizes and Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.