SecTor 2016 - Tuesday, October 18
09:00
Snowden
Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses
10:15
Blaich
Securing Network Communications: An Investigation into Certificate Authorities on Mobile
Sapiro
Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.
Evenchick
CANtact: Open Source Automotive Tools
Seymour
How to build a malware classifier [that doesn’t suck on real-world data]
Bedard
All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I
Alvarez
Understanding Ransomware: Clear and Present Danger
11:30
Pogue
Eliminating the Automation and Integration Risks of the “Security Frankenstein”
Antonakos
Held for Ransom: Defending your Data Against Ransomware
Allor
The Emerging Era of Cognitive Security
Miller
An Effective Approach to Automating Compliance Activities
Pepper
When ‘Oops’ Isn’t An Acceptable Answer
Germain
Network virtualization to enhance context, visibility and containment
12:00
Hypponen
Securing Our Future
13:25
Sonya
WiFi Exploitation: How passive interception leads to active exploitation
Bassegio, West
Getting Business Value from Penetration Testing
Wilhoit
The State of SCADA on the Internet
Zanero
Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis
Earhard
Can massive data harvesting drive down the time to breach detection?
Leonard
The Industry Need for Cloud Generation Security
14:40
Brotherston
[Ab]using TLS for defensive wins
Wysopal
Safety Should be the Security Paradigm
Gommes
Jihadism and Cryptography, from internet to softwares
Collins
Practical Static Analysis for Continuous Application Security
Stojanovic
IPv6 for the InfoSec Pro on the Go
Earhard
Exposing Ransomware: Intelligent cybersecurity for the real world.
14:55
Beaupre, Bourne, Murray, Payne
Developing your Career in IT Security
15:55
Johansen
Crash Course in Kubernetes & Security
O'Connor
Security by Consent, or Peel’s Principles of Security Operations
Montoro
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events
Braeken
Hack Microsoft by using Microsoft signed binaries
Sethi-Reiner
The Security Problems of an Eleven Year Old and How To Solve Them
Humble
Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks
SecTor 2016 - Wednesday, October 19
09:00
Blamire, Lavi, Leo, Nemani, Payne, Stapley
It’s 2016: What can you do about gender balance in Information Security?
10:15
Nunnikhoven
How To Secure Serverless Applications
Grimes
Data-Driven Computer Security Defense
Sistrunk
Control system security, are we living on luck?
Case
Utilizing Memory and Network Forensics for Scalable Threat Detection and Response
Bhargava, Desfigies, Shin
Lighting up the Canadian Darknet Financially
Sarwate
Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation
11:30
Blenkhorn
Why Technology is Not the Answer to Cybersecurity
Wilson
The Cyber Security Readiness of Canadian Organizations
Sun
Lessons from the Attack Chain: Bolster Your IR Program
Read
Stopping the Attacker You Know
Pickens
Rethinking Threat Intelligence
Brantley
Global Encryption Usage is on the Rise!
12:00
Pogue
Retaking surrendered ground: making better decisions to fight cybercrime
13:25
Galloway
AirBnBeware: short-term rentals, long-term pwnage
Mosca
Cybersecurity in an era with quantum computers: will we be ready?
Greene
RTF Abuse: Exploitation, Evasion and Counter Measures
Gates, Johnson
Purple Teaming the Cyber Kill Chain: Practical Exercises for Management
Maddalena
Expanding Your Toolkit the DIY Way
Cresswell
Securing a Cloud-Based Data Center
14:40
Bilodeau
Lessons Learned Hunting IoT Malware
Biswas
How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings
Smith
Hiding in Plain Sight – Taking Control of Windows Patches
Simmons
Open Source Malware Lab
Penney
The Power of DNS: Gaining Security Insight Through DNS Analytics
Saurbaugh
Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence.


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.