12:00 |
Aitel
|
Keynote (Tuesday) |
13:00 |
Lee
|
How to Implement New Security Features and Fix Broken Stuff with Feature Flags and A/B Tests |
Butterworth,
Cornwell,
Kovah
|
Setup for Failure: Defeating SecureBoot |
|
Melancon
|
Diablo Security: What Can Infosec Learn from Video Games? |
|
14:00 |
Cornell
|
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together |
Boyer
|
Measuring Security Outcomes: From Data to Insight for Third Party Risk Management |
|
Ahlberg
|
Top 50 Non-State Hacker Groups of the World |
|
15:30 |
Ellis
|
Reverse Engineering the Human OS |
Chenette
|
Offensive Defense through Attacker Mimicry |
|
Miller
|
Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Economic & Social Systems |
|
16:30 |
Wardle
|
iOS App Reversing; a Practical Approach |
Troutman
|
Mackerel: A Progressive School of Cryptographic Thought |
|
Nye
|
Risk, Audit, and Compliance for Hackers & Defenders |
10:00 |
Schneier
|
Keynote (Wednesday) |
11:00 |
Pfost
|
Case Study: How to Build an Application Security Metrics Program |
Behrens,
Hoernecke
|
Trapping Hacks With Ensnare |
|
Asadoorian
|
Hacking The US Trademark System: A Cautionary Tale |
|
13:30 |
Doherty
|
Security Testing WITHOUT an Army of Ninjas |
Thompson,
Widup
|
Ripped from the Headlines: What the news tells us about Information Security Incidents |
|
Ottenheimer
|
Delivering Security at Big Data Scale |
|
14:30 |
Cheyne,
Rudis
|
Speed Networking |
Cucinelli,
Ellis,
Knowlton
|
Hiring/Recruitment Workshop |
|
16:00 |
Meyer
|
Reality Checking Your Security Testing Program |
Darley,
Millar,
Wilson,
Wunder
|
Information-sharing Tools, Taxonomies, and Trust: Babel or Better? |
|
Crouse
|
The Privileged User Discussion: Security Enforcer or Threat? |
|
17:00 |
Ross
|
URL Scheme Security on iOS |
Crowley
|
How to Save the Environment, or Why Nobody Takes Your Security Advice |
|
Goerlich
|
Aligning Threats and Allies through Stories |
10:00 |
Matwyshyn
|
Keynote (Thursday) |
11:00 |
Mayer
|
Introducing idb - Simplified Blackbox iOS App Pentesting |
Wallach
|
Too Many Fallen: #SecBurnOut Pt3 "Prevention & Introspection" |
|
Ellis
|
5,500 hackers + Your code = ??? |
|
13:30 |
Mahjoub
|
Marauder or Scanning your DNSDB for Fun and Profit |
Corman,
Ellis,
Woods
|
The Cavalry Isn't Coming; It Falls To Us: How you can help! |
|
Amit
|
Painting A Company Red and Blue |
|
14:30 |
Augliere
|
IT Security Risk Assessment:Measuring What Matters |
Lanier,
Stanislav
|
The Internet of Things: We've Got to Chat |
|
Jaquith
|
Applied Security Metrics: Building the Financial Services Threat Report |
|
15:45 | Wait Wait Don't Pwn Me! |
|
16:45 | Raffle Prizes and Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.