SOURCE Boston 2015 - Wednesday, May 27
08:30
Opening Remarks - Wed.
09:00
Routh
Keynote - Wed. Morning
10:00
Li
iROP - Interesting ROP gadgets
Cutler
Adversary Profile: Gothic Panda
Baker, Ostrowski
Evolution of Threat
10:50
Wood
Reactive JS Security Testing & Exploitation
Lambright
Penetration Testing in the Cloud
Feinblum, Woolwine
Getting the most from your managed security providers
11:35
Crowley, Smith
Bugged Files: Is Your Document Telling on You?
O'Connor
Using NLP to detect phishing and APT CnC domains
Syversen
Quantifying cyber attacks - to optimize and assess your defense
13:30
Mannino
MQTT, CoAP, and Building Secure Things
Cowperthwaite
Growing Up: A Maturity Model and Roadmap for Vulnerability Management
Wallach
Excavating for Empathy
14:20
Carlson
A Swift Teardown
Asadoorian
Embedded Insecurity: Can We Fix The Internet of Evil Things?
15:15
Ross
iOS App Analytics VS Privacy: An analysis of the use of analytics
Grec
Defending the Enterprise with Evernote
Benway, Cirino, Farrell, Wysopal
Building a Hub for Cybersecurity: New England’s Tech Drive
16:00
Murray
Keynote - Wed. Afternoon
SOURCE Boston 2015 - Thursday, May 28
08:30
Opening Remarks - Thur.
09:00
Schwartz
Keynote - Thur. Morning
10:00
Ellis
Hacking the Media for Fun and Profit
Ellis
Cognitive Injection
Div
Know the Enemy: Understanding the Adversarial Mindset
10:50
Nelson
Monitoring Social Media in 5 Minutes a Week
Wattanasin
Improving the State of Healthcare Information Security as a Security Investigator
11:35
Losi
Selling for Security Professionals
Pyorre
Protecting your cloud server with a cloud IDS
Roytman
Who Watches the Watchers? Metrics for Security Strategy.
13:30
Baker, Bendonis, Bheyne, Ellis, Perez
From Tech to Exec (Panel)
Wilson
Cyber Information Sharing -- A Means, not an End
Linwood, O'Connor
All That Cybers Is Not War
14:20
Cheyne, Rudis
Speed Networking
15:15
Lightning Talks (Vendor Room)
Pearce
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols
Rudis
Before and Beyond the Breach: New Research in the 2015 DBIR
16:00
Kennedy
Keynote - Thur. Afternoon
16:45
Closing Remarks - Thur.


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.