08:30 | Opening Remarks |
|
09:00 |
Thieme
|
Play Through the Pain? - The Impact of Forbidden Knowledge on Security and Intelligence Professionals |
09:45 | Speed Networking |
|
10:45 |
Cheyne,
Thieme
|
Workshop |
Costa,
Silva
|
Improving your protection by automating real world attacks |
|
Peterson
|
Defending the Cloud from the Full Stack Hack |
|
11:35 |
Carlson,
Reiter
|
Role Playing with Intermediate Representations |
Cooprider
|
How security changes in the cloud and why you care |
|
13:30 |
Ellis,
Feinblum
|
The Art of Crisis Management |
Contos
|
Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them |
|
McSweeney
|
DGA Antivenom: Stopping new configurations before analysis |
|
14:20 |
Hurlbut
|
Developing a Threat Modeling Mindset |
Schmidt
|
The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices |
|
15:35 |
Coles,
Ward
|
Upstream without a paddle - lessons learnt! |
Mannino
|
Don’t Touch Me That Way |
|
Chase,
Coley
|
Toward Consistent, Usable Security Risk Assessment of Medical Devices |
|
16:30 |
Nickerson
|
Nightmares of a Pentester |
17:30 | Attendee Reception |
|
19:00 | Evening Networking Reception |
09:00 |
Diamond
|
10 Words to Stop Using Now |
10:00 |
Diamond
|
10 Words to Stop Using Now (Workshop) |
Hay
|
Bootstrapping A Security Research Project |
|
Holub
|
Deconstructing The Cyber Kill Chain of Angler Campaign |
|
10:50 |
Gururangan,
Rudis
|
The Topology of Malicious Activity in IPv4 |
Herzberg
|
Emerald City of Cyber Security |
|
11:40 |
Chow,
Wattanasin
|
The Cybersecurity Education Gap - What Do We Do Now? |
Roytman
|
Mr. Human - Vulnerability Management from the Attacker’s Perspective |
|
Poulin
|
httpillage: calling all nodes |
|
13:20 |
Carielli,
Cleary
|
Talk Security to Me: Case Studies for Communicating Security Issues |
Amit
|
Social Media Risk Metrics |
|
Garbis
|
Why is Network Access Control So Hard? Is there a Better Way? |
|
14:10 |
Morency
|
Making Change from Assessments that is not just Monetary |
Miessler
|
Key Attribute Risk Management and Analysis (KARMA) |
|
Li,
Luo
|
Side Channel Defense with Intel Cache Allocation Technique |
|
15:10 |
Plunkett
|
Learning from Crises: Roles, Risks, and Rewards on the Road to Recovery |
16:00 | Personal Development Panel |
|
16:45 | Lightning Talks |
|
17:30 | Raffle Prizes and Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.