10:00 | ...But If You Try Sometime, You Get What You Need |
|
Security Outliers: Cultural Cues from High-Risk Professions |
||
11:00 |
Klinger
|
So You Want to Write a Security Book, Eh? |
Hyper-V Security |
||
12:00 | The changing landscape of Enterprise Information Security Architecture |
|
Ellis
|
I can't make this sh!t up! - War Stories from a former and award winning CSO |
|
14:00 |
Coates
|
PCI: The R.O.U.S. for Service Providers |
Teach to the Test: How anti malware testing gets it wrong (and makes us less secure) |
||
15:00 | Personal Identity Verification Interoperability (PIV-I) |
|
Hillman
|
Tastes Great vs Less Filling: Deconstructing Risk Management |
|
16:00 |
Hawthorn
|
Fsck the FUD and the ECHO ECho echo Chamber |
Escalating privileges through Secondary Logon (RunAs) processes |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.