BSidesLV 2013 - Wednesday, July 31
10:00
Rioux
Keynote – The Security Industry - How to Survive Becoming Management
11:00
Levomäki, McDevitt, Niemi, Shah, Shaw
Discovering Dark Matter: Towards better Android Malware Heuristics
Rodzon
Diamonds, Fitness and Cults: Manipulation for Fun and Profit
Hay
Never Mind Your Diet, Cut the Crap From Your Vocabulary [Mentored by Brian Martin]
Kopchak
Attacking and Defending Full Disk Encryption
Jogi
You Are Being Watched!
12:00
Radcliffe
Mom! I Broke My Insulin Pump….Again!
Bellis, Roytman
Vulnerability & Exploit Trends: A Deep Look Inside The Data
Tallah
The 7 habits of highly effective CISOs [Mentored by Wendy Nather]
Sistrunk
Say It To My Face
Smith
Calling All Researchers: A Discussion on Building a Security Research Framework
13:00
Davidson, Schiffman
Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth
Grecs
EC2 or Bust – How to Build Your Own Pen Testing Lab in Amazon EC2
Quix0te
The Little Dutch Boy [Mentored by Bill E. Ghote]
Hutton
Alex Dreams of Risk: How the Concept of Being a Craftsman Can Help You Find Meaning and Avoid Burnout.
Nibbelink, Payne
Evil Empire: SIEM FTW
15:30
Malone
HiveMind: Distributed File Storage Using JavaScript Botnets
Hay
Techniques for Escaping the AppSec Labyrinth
FailOpen
Human Blue Teaming (Learning to patch the vulnerabilities in ourselves) [Mentored by Jimmy Shah]
Banks, Woods
GTFO FTW: Hacking Your Lifestyle for Fun and Profit
Roll-your-own Lightning Talks (Wed)
16:30
WiK
gitDigger: Creating useful wordlists from public GitHub repositories
Daniel
The Erudite Inebriate’s Guide to Life, Liberty, and the Purfuit of Happinefs
Renegade6
Stop Shooting Blanks – No magic bullets in your arsenal [Mentored by Nicolle Neulist]
Campbell, Campbell
You Can’t Make People Act More Securely, You Can Help Them Want To.
17:30
Kottmann, Steele
Collaborative Penetration Testing With Lair
Adams
Hack the Hustle! Career Strategies for Information Security Professionals
Ward
Flameout – Burnout Supernova [Mentored by Ally Miller]
Murray, Zhang
Your Droid Has No Clothes
18:30
Fox
Social Aftermath – Responding to Social Pwnage
Mills
Information Sharing, or “I’ve got 99 problems and they’re probably pretty similar to yours”
Sweet
The Sensual Side of 3D Printing [Mentored by Javvad Malik]
19:30
Closing notes and raffle (Wed)
20:30
Special Presentation
BSidesLV 2013 - Thursday, August 1
10:00
Blue
Keynote - Silence Equals Death
11:30
Corman, Percoco
The Cavalry Isn’t Coming: Starting the Revolution to Fsck it All!
Sokol
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn’t Suck
Slibermintz
Fun with WebSockets using Socket Puppet [Mentored by Weasel]
Linn
Swiping Cards At The Source: POS & Cash Machine Security
Krypt3ia
Attribution Shmatribution! FIX YOUR SHIT!
12:30
Gough, Levomäki, Niemi, Robertson
A fire in the eye
Malik
How embracing social media helped me stop the hackers, save the world and get the girl!
Pinto
Using Machine Learning to support Information Security [Mentored by Joel Wilbanks]
Busticating Same-Origin: The Fun Way
Daniel, Hulme, Mortman, Ottenheimer, Umerley, Werby
Breach Panel
15:00
Artes
Defense Evasion Modeling
Elisan
Malware Automation
Siegel
The Truth, You Thought We Wouldn’t Know? [Mentored by Terry Gold]
TProphet
OMFG China!
Roll-your-own Lightning Talks (Thurs)
16:00
Gough
“Malware Management Framework” – We detected WinNTI with it!
Kita
Popping the Penguin: An Introduction to the Principles of Linux Persistence
Kovacic, Sperli
Vulnerabilities in Application Whitelisting: Malware Case Studies [Mentored by Brav0hax]
Auerbach, Galperin, Jaycox, Opsahl
Ask the EFF Panel
17:00
Werby
Crunching the Top 10,000 Web
Costello
Network Survival WCS
Ebony
The Goodness is Baked In: Baking Assurance into Software [Mentored by Davi Ottenheimer]
Matwyshyn
Catawampus
18:00
Thieme
Governments and UFOs: A Historical Analysis of Disinformation and Deception
Beardsley, d’Otreppe
The Slings and Arrows of Open Source Security
Panchmahalkar
Matriux Leandros – An Open Source Penetration Testing and Forensic Distribution [Mentored by Savant42]
Riley
Mobile Fail: Cracking open “secure” android containers
19:00
Dudley, Gough, Robertson
Strange interactions in personal data: Brokers and the CFAA.
Fak3r
What if Petraeus was a hacker? Email privacy for the rest of us.
Moore
Sixteen Colors: Archiving the Evolution of ANSI and ASCII Art [Mentored by Brendan O'Connor]
Soldier of Fortune
Legacy 0-Day: How Hackers Breached the Logica Mainframe
20:00
Closing notes and raffle (Thur)


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.