10:45 |
Percoco
|
Welcome |
11:00 |
Graham
|
Attack of the Clichés |
12:00 |
Crowley
|
Cleaning up Magical Crypto Fairy Dust with Cryptanalib and FeatherDuster |
Pinto
|
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness |
|
12:30 |
McEvoy
|
Overcoming Imposter Syndrome (even if you’re totally faking it) |
13:00 |
Espinoza,
Flom
|
OPSEC on the Darkweb: The good, the bad and the ugly |
Bryan
|
You sunk my battleship! |
|
13:30 |
Hennenfent,
Smith
|
Turning Credential Harvesting Into Credential Clearcutting: Phishing 2FA Systems |
14:00 |
Carlis
|
Securitygenic: Fighting User Apathy and Indifference |
14:30 |
Ilyas
|
Prime Time Cyber Heists – Reporting from the Trenches! |
15:00 |
Lei
|
Privacy's Past, Present and Future |
metacortex
|
Don't be stupd on GitHub |
|
15:30 |
Eberhardt,
Weiss
|
Playing with Pictures: Adult Coloring on the Internet |
16:00 |
1
|
35 Years of Cyberwar: The Squirrels are Winning |
17:00 |
Vanatta
|
ARRR Maties! A map to the legal hack-back |
Hoog
|
Improving mobile security with forensics, app analysis and big data |
|
17:30 |
Toukharian
|
Social Untrust |
18:00 |
Lampe
|
Hack All the Candidates |
19:00 |
Liber
|
Security ResPWNses - Do and Donts of security disclosures |
20:00 | Closing - Day 1 |
11:00 |
Hanley,
Oberheide
|
Extrapolating from Billions of Access Security Events |
11:30 |
Vann
|
Cyber Vulnerabilities of America's Pipe Lines |
12:00 |
Lundberg
|
Knox: Dealing with Secrets at Scale |
Bambenek
|
Corporate Espionage Without the Hassle of Committing Felonies |
|
12:30 |
Nikolich
|
Cybersecurity Research: Pushing the Boundaries |
13:00 |
Rogers,
Ross
|
Real solutions from real incidents: save money and your job! |
grecs
|
Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools |
|
13:30 |
Flathers
|
Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features |
14:00 |
Sandin
|
The Complete ESP8266 Psionics Handbook |
Dyas,
Schmitt,
Valin
|
A Major New Trend in the Enterprise is Whitelisted Proxies |
|
14:30 |
Brown
|
Mo Money Mo Problems: The Clean(ish) Cashout |
15:00 |
Vyrus
|
Crimewave 101 |
16:00 | Contest Results |
|
16:30 | Closing |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.