BSidesLV 2011 - Wednesday, August 3
10:30
Keanini
Boyd's OODA and General Predator/Prey theory
Nather
How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault)
Ely
Exploiting Management For Fun and Profit - or - "Management is not stupid, you are"
11:30
Smith
Are There Still Wolves Among Us?
Roberts
Planes keep falling on my head
Donarski
Weaponizing The Smartphone: Deploying The Perfect WMD
12:30
Kelley, Kennedy
Using the Teensy for so much more...
Rook
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it
Ristic
A study of what really breaks SSL
13:30
Towne
Vulnerability Research Circa 1851
Ottenheimer
2011: A Cloud Odyssey
Vandevanter
Distributed Denial of Service Attacks for Whitehats
14:30
Los
Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget)
Mein
All about the Benjamins -- Google's vulnerability reward programs
Kotler
Sounds Like Botnet
15:30
Johansen, Osborne
Hacking Google Chrome OS
Gostom, Marpet
Smile for the Grenade! Camera go Bang!
Cowen
Anti Anti Forensics
16:30
Cortesi
UDID pwnage (0day for iOS)
Grecs
How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career
Fox
Tell Me Your Secrets - Tales of Social Engineering and The Human Mind
BSidesLV 2011 - Thursday, August 4
10:30
Baskin
Walking the Green Mile: How to Get Fired After a Security Incident
Barrera, Sokol
How to Hide Your Pr0n
Vedaa
Fuck the Penetration Testing Execution Standard (PTES)
11:30
Zatko
Cyber Fast Track
Weidman
Transparent Botnet Command and Control for Smartphones over SMS
Baker
Living the Dream! - Info Sec Style
12:30
Bannedit, egyp7
Long Beard's Guide to Exploit Dev
warezjoe
Wireless’ dirty sisters: The other RF you aren’t looking at and why you are going to get hurt!
Mahbubani
Cognitive Intelligence and Network Analysis
13:30
Beresford
Siemens / SCADA 0day
Mimoso, Petermann, Shafer, Wilson
InfoSex Sells: The Impact Of The Media And Public Opinion On Security
Shpantzer
Cultural Cues from High Risk Professions
14:30
Amit
Advanced data exfiltration - the way Q would have done it
Abraham
Hacking webapps is more fun when the end result is a shell!
Deacon
Info Sec Institute: What College Never Will Teach You
15:30
Moore
Something Awesome™
Corman, Daniel, McKeay, Shpantzer, Thayer
Better to burn out than to fade away?
Friedli
THE 99¢ HEART SURGEON DILEMMA (How to fix penetration testing.)
16:30
Jay, Shane
How to pass audits with non-compliant systems
Manning, Poulson, Riley, Ross
How (not) to run a Bsides
Bratus
Exploiting the Hard-Working DWARF


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.