09:00 |
Potter
|
Keynote: Inside the Outsider - Deep and not so deep thoughts from an info sec lurker |
10:30 |
Klein Keane
|
IoT Security |
Rogue
|
A Brief History of the Information Security Industry |
|
Rico
|
Wireshark for Post-Incident Analysis |
|
11:00 |
Kinch
|
R2-D2 where are you? |
11:30 |
Hewitt
|
Raspberry Pi, Kismet, and PCI 11.1 |
McMahon
|
How Evil Kirk Uses Maltego |
|
13:00 |
Smith
|
How to Recruit Purple Squirrels, Pink Unicorns and other Mythical Security Creatures. Or If You Are a Pink Unicorn, How Best to Work with Recruiters |
Gilsinn
|
Mechanics of an ICS/SCADA Man-In-The-Middle Attack |
|
Pachulski
|
Physical Penetration Testing (Low tech or no tech) |
|
14:00 |
Frisvold
|
processing 101 for kids |
15:00 |
Martin
|
OSINT for Fun & Games |
Brian
|
Building the Next Generation of InfoSec |
|
Kinch
|
R2-D2 where are you? |
|
16:00 |
Arnoth
|
IDS is dead, long live IDS |
Muentz
|
"Reasonable" security or are the lawyers coming? |
|
17:00 |
Marpet
|
Technology? Business? How do they intersect, and do I care? |
Spurgeon
|
Data you don't store cannot be hacked! |
08:30 |
grecs
|
Malware Analysis: N00b to Ninja in 240 Minutes |
09:00 |
Vargas
|
Hello Ransomware, Goodbye Data? |
Berstler
|
Kids - Learn to Bypass Parental Controls! |
|
10:00 |
Kinch
|
R2-D2 where are you? |
10:30 |
Asenov
|
Practical IPv6 Setup and Security for your Home |
@Nescafe187
|
Advanced Cyber Detection: Kill Chain Evolution |
|
11:00 |
Bechard
|
Incident Response Explained by Dora The Explorer and IR training Game |
Lager,
Lager
|
A tiny datacenter, On my head |
|
13:00 |
Klein,
McNamara
|
Cyber Intent: Cybersecurity |
Handorf
|
SoHo SIGINT |
|
Hess
|
Padawans - Hacking 101 |
|
Thomas
|
Scratching the Surface: What We Know about Lockpicking Forensics So Far |
|
13:30 |
Rhoades
|
Web Hacking 101 Hands-on with Burp Suite |
14:30 |
grecs
|
Bootstrapping Threat Intelligence Out of Thin Air |
Infojanitor
|
Flow Chart Self-Defense |
|
15:30 |
Marpet,
Norman,
Norman
|
0wn the c0n - Two BSides for the price of one! |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.