• Friday, September 30
  • Welcome to DerbyCon 2011 – Intro to the con and events

    Martin Bos, Adrian Crenshaw, David Kennedy
    Fri, 09:00 - 09:50
    Track 1
  • Keynote - Acoustic Intrusions

    HD Moore
    Fri, 10:00 - 10:50
    Track 1
  • Hackers for Charity Update

    Johnny Long
    Fri, 11:00 - 11:50
    Track 1
  • Adaptive Penetration Testing

    David Kennedy, Kevin Mitnick
    Fri, 12:00 - 12:50
    Track 1
  • The Penetration Testing Execution Standard (PTES) Panel

     
    Fri, 13:00 - 13:50
    Track 1
  • The Details Don’t Matter

    Bruce Potter
    Fri, 14:00 - 14:50
    Track 1
  • Compliance: An Assault on Reason

    Chris Nickerson
    Fri, 15:00 - 15:50
    Track 1
  • Hook, Line and Syncer: The Liar for Hire’s Ultimate Tacklebox

    Pat McCoy, Chris Silvers
    Fri, 18:00 - 18:50
    Track 1
  • Jason Scott’s Shareware Calvacade

    Jason Scott
    Fri, 19:00 - 19:50
    Track 1
  • Saturday, October 1
  • Mining Sensitive Information From Images Using Command-Line OCR

    Dennis Kuntz
    Sat, 09:00 - 09:50
    Track 1
  • Beat to 1337: Creating A Successful University Cyber Defense Organization

    Mike Arpaia
    Sat, 10:00 - 10:50
    Track 1
  • Tactical Post Exploitation

    Carlos Perez
    Sat, 11:00 - 11:50
    Track 1
  • Offensive Countermeasures: Still trying to bring sexy back

    Paul Asadoorian, John Strand
    Sat, 12:00 - 12:50
    Track 1
  • When Fuzzers Miss: The no Hanging Fruit.

    Tony Huffman
    Sat, 13:00 - 13:50
    Track 1
  • You’re Going to Need a Bigger Shovel – A Critical Look at Software Security Assurance

    Rafal Los
    Sat, 14:00 - 14:50
    Track 1
  • OSINT Beyond the Basics

    Rick Hayes, Karthik Rangarajan
    Sat, 15:00 - 15:50
    Track 1
  • Anti-Forensics for the Louise

    int0x80
    Sat, 16:00 - 16:50
    Track 1
  • Tomorrow you can patch that 0day – but your users will still get you p0wn3d

    Rick Redman
    Sat, 17:00 - 17:50
    Track 1
  • Covert Channels using IP Packet Headers

    Joff Thyer
    Sat, 18:00 - 18:50
    Track 1
  • BioMining: Data Mining for (Neuro) hackers

    Magen Hughes
    Sat, 19:00 - 19:50
    Track 1
  • Sunday, October 2
  • Battery Firmware Hacking

    Charlie Miller
    Sun, 09:00 - 09:50
    Track 1
  • Win32 Exploit Development With Mona and the Metasploit Framework

    Elliott Cutright, Peter Van Eeckhoutte
    Sun, 10:00 - 10:50
    Track 1
  • Collecting Underpants To Win Your Network

    Ryan Linn
    Sun, 11:00 - 11:50
    Track 1
  • Social Engineering is a Fraud

    Jamison Scheeres
    Sun, 12:00 - 12:50
    Track 1
  • Infectious Media – Bypassing AutoRun once and for all

    Joshua Kelley
    Sun, 13:00 - 13:50
    Track 1
  • Desktop Betrayal: Exploiting Clients through the Features They Demand

    Tom Eston, Kevin Johnson
    Sun, 14:00 - 14:50
    Track 1
  • Closing Ceremony

     
    Sun, 15:00 - 15:50
    Track 1