09:00 |
Klinger
|
My Life on the Infosec D-List |
09:30 |
Correll
|
Preparing for a PCI forensic investigation - A ex-QIRA speaks out |
10:00 |
Hardin,
Moore,
Thayer
|
So What's the Alternative? A group discussion of the security solutions replacing password authentic |
11:00 |
Brown,
Keanini
|
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret) |
13:00 |
Ollmann
|
Being Inbred Isn't Just a Problem for Hillbillies. Groupthink and the InfoSec Industry |
14:00 |
Coates,
Ellis,
Hutton,
Karg,
Klinger,
Thayer
|
Unicorns, Clubhouses, and Ruffled Feathers: Women in Security |
15:00 |
Jones
|
Playing with Fire – Live Demonstration of Today’s Most Dangerous Malware |
16:00 |
Nassery
|
Network Time Bandit |
09:00 |
Frank^2
|
Security? Who cares! |
09:30 |
Los
|
So You Want to Analyze Malware? |
10:00 |
Ose
|
Computing Risk without Numbers: A Semantic Approach to Risk Metrics |
11:00 |
Neckar
|
Your computer is worth 30 cents |
13:00 |
Kiamilev,
Rook
|
Social Penetration |
14:00 |
Hawthorn,
Holyfield,
Poor,
Sally
|
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine |
15:00 |
Murilo
|
Risk Management - Time to blow it up and start over? |
16:00 |
Rad
|
Memory Corruption, Exploitation, and You |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.