ShmooCon XVI - 2020 - Friday, January 31
14:00
Opening Remarks, Rumblings, Ruminations, and Rants
15:30
Livingston
Moose v. Woodchuck
16:00
Teplov
Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling
16:30
Gellis
Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On
17:00
Leitschuh
Zoom 0-Day: How Not to Handle a Vulnerability Report
17:30
Robinson
What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR
18:00
Postnikoff
Robots and Privacy
19:00
Firetalks Opening
19:10
McHale
Cybersecurity Clubs and You
19:30
Trobbiani
Flipping Bits on NSRL
19:50
Giglio
Using Abusing the Freedom of Information Act
20:10
Ventura
Using Android WebViews to Steal All the Files
20:30
Iversen, Wheeler
Do Unto Others: A Red Team Ethical Framework for Offensive Rules Of Engagement
20:50
Troutman
DNS New World Order: QuadX! DoH! DoT! Da Fuq?
ShmooCon XVI - 2020 - Saturday, February 1
10:00
Lyne, Miles
Extracting an ELF From an ESP32
Allen, Benge
Battling Supermutants in the Phishing Wasteland
Jover
5G Protocol Vulnerabilities and Exploits
10:30
LABS: Networking / Core Services
10:45
LABS: Vulnerability Management
11:00
Franken
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
Manning
Command and KubeCTL: Real-World Kubernetes Security for Pentesters
Bailey, Ellis, Leiserson, Opsahl
The Hacker’s Guide to Cybersecurity Policy in 2020
11:30
LABS: Network Security
11:45
LABS: Infrastructure / Visualization
12:00
Lambert
Whitelisting LD_PRELOAD for Fun and No Profit
Stella
Airplane Mode: Cybersecurity @ 30,000+ Feet
Malekos Smith
The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare
13:00
Amateur Radio Exams
14:00
Garrett
Privacy Scores for iOS Apps
Everette
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up
Smith
Choose Your Own Adventure: Ransomware Response!
15:00
Pahle
Chip Decapping on a Budget
Mosely, Mosley
Teen Hacks for Obfuscating Identity on Social Media
Pyle
Cisco SMB Products — Critical Vulnerablities / 0-day Release
15:30
Ralls
Banjo: An Android Disassembler for Binary Ninja
Gomez
Software Mitigations for Hardware Vulnerabilities
Nickels
Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling
LABS: Log Collection / Aggregation
15:45
LABS: Security Operations Center
16:00
Kamdjou
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud
Audie, Corman
SBOM: Screw it, We’ll Do it Live!
Pahi, Wharton
Face/Off: Action Plan for Perils & Privileges of Facial Recognition
16:30
Tzvetanov
Security Researcher OPSEC
Baker
Using OSINT for Human Rights and Victim Support
LABS: Threat Hunting / Log Correlation
16:45
LABS: Wireless Network
17:00
The Shmoo Group
0wn the Con
Gilbert
Anti-Forensics for Fun and Privacy
Beardsley, Cable, Dowsett, Ellis, Koran
Hacking Democracy: On Securing an Election
ShmooCon XVI - 2020 - Sunday, February 2
10:00
Handorf
A Wireless Journeyman’s Experience in Practical SIGINT
Olsen
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Budington, Opsahl
Crossing the Border With Your Electronic Devices
11:00
Griffin
Knowing the UnFuzzed and Finding Bugs with Coverage Analysis
Loveless
Real World Zero Trust Implementation
Sanders
Playing the Short Game: The Effects of Data Breaches on Share Prices
12:00
Liszewski
The Verilog to Verilog Decompiler
Protzenko, Swamy
Project Everest: Fast, Correct, and Secure Software for Deployment Now!
Yacko, Wacko, and Dot
Hack the Stars
13:00
Beetle, Blaze, Potter, Todt
Between Two Moose
14:00
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.