BsidesSF 2010 - Tuesday, March 2
09:00
Klinger
My Life on the Infosec D-List
09:30
Correll
Preparing for a PCI forensic investigation - A ex-QIRA speaks out
10:00
Hardin, Moore, Thayer
So What's the Alternative? A group discussion of the security solutions replacing password authentic
11:00
Brown, Keanini
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret)
13:00
Ollmann
Being Inbred Isn't Just a Problem for Hillbillies. Groupthink and the InfoSec Industry
14:00
Coates, Ellis, Hutton, Karg, Klinger, Thayer
Unicorns, Clubhouses, and Ruffled Feathers: Women in Security
15:00
Jones
Playing with Fire – Live Demonstration of Today’s Most Dangerous Malware
16:00
Nassery
Network Time Bandit
BsidesSF 2010 - Wednesday, March 3
09:00
Frank^2
Security? Who cares!
09:30
Los
So You Want to Analyze Malware?
10:00
Ose
Computing Risk without Numbers: A Semantic Approach to Risk Metrics
11:00
Neckar
Your computer is worth 30 cents
13:00
Kiamilev, Rook
Social Penetration
14:00
Hawthorn, Holyfield, Poor, Sally
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
15:00
Murilo
Risk Management - Time to blow it up and start over?
16:00
Rad
Memory Corruption, Exploitation, and You


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.