08:30 | Opening Remarks - Wed. |
|
09:00 |
Routh
|
Keynote - Wed. Morning |
10:00 |
Li
|
iROP - Interesting ROP gadgets |
Cutler
|
Adversary Profile: Gothic Panda |
|
Baker,
Ostrowski
|
Evolution of Threat |
|
10:50 |
Wood
|
Reactive JS Security Testing & Exploitation |
Lambright
|
Penetration Testing in the Cloud |
|
Feinblum,
Woolwine
|
Getting the most from your managed security providers |
|
11:35 |
Crowley,
Smith
|
Bugged Files: Is Your Document Telling on You? |
O'Connor
|
Using NLP to detect phishing and APT CnC domains |
|
Syversen
|
Quantifying cyber attacks - to optimize and assess your defense |
|
13:30 |
Mannino
|
MQTT, CoAP, and Building Secure Things |
Cowperthwaite
|
Growing Up: A Maturity Model and Roadmap for Vulnerability Management |
|
Wallach
|
Excavating for Empathy |
|
14:20 |
Carlson
|
A Swift Teardown |
Asadoorian
|
Embedded Insecurity: Can We Fix The Internet of Evil Things? |
|
15:15 |
Ross
|
iOS App Analytics VS Privacy: An analysis of the use of analytics |
Grec
|
Defending the Enterprise with Evernote |
|
Benway,
Cirino,
Farrell,
Wysopal
|
Building a Hub for Cybersecurity: New England’s Tech Drive |
|
16:00 |
Murray
|
Keynote - Wed. Afternoon |
08:30 | Opening Remarks - Thur. |
|
09:00 |
Schwartz
|
Keynote - Thur. Morning |
10:00 |
Ellis
|
Hacking the Media for Fun and Profit |
Ellis
|
Cognitive Injection |
|
Div
|
Know the Enemy: Understanding the Adversarial Mindset |
|
10:50 |
Nelson
|
Monitoring Social Media in 5 Minutes a Week |
Wattanasin
|
Improving the State of Healthcare Information Security as a Security Investigator |
|
11:35 |
Losi
|
Selling for Security Professionals |
Pyorre
|
Protecting your cloud server with a cloud IDS |
|
Roytman
|
Who Watches the Watchers? Metrics for Security Strategy. |
|
13:30 |
Baker,
Bendonis,
Bheyne,
Ellis,
Perez
|
From Tech to Exec (Panel) |
Wilson
|
Cyber Information Sharing -- A Means, not an End |
|
Linwood,
O'Connor
|
All That Cybers Is Not War |
|
14:20 |
Cheyne,
Rudis
|
Speed Networking |
15:15 | Lightning Talks (Vendor Room) |
|
Pearce
|
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols |
|
Rudis
|
Before and Beyond the Breach: New Research in the 2015 DBIR |
|
16:00 |
Kennedy
|
Keynote - Thur. Afternoon |
16:45 | Closing Remarks - Thur. |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.