BSidesDC 2016 - Friday, October 21
07:00
Registration - Friday
08:00
Demick, Hazelton, Jones, Schroeder
Binary Reverse Engineering for Beginners
Randall
Bro Crash Course
15:00
SANS NetWars Tournament
BSidesDC 2016 - Saturday, October 22
09:00
Norman, Weiss
Welcome
Hazelton
Building Blocks: The Security Analyst's Toolbox
gabler, Paguaga
I got a shell... now where's the Power
Wireless Capture the Flag (WCTF) - Saturday
Lockpick Village / IoT Village - Saturday
09:15
Hofmann
Keynote
10:00
2nd Annual - CryptKids Con at BSidesDC
10:30
Randall
CryptKids Keynote
Allmon
WCTF Magic as told by a clumsy Magician
11:30
Beard, Thyagarajan
Detecting Malicious websites using Machine Learning
MacKay
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
13:30
Metcalf
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Balakrishnan
Applying data science to identify malicious actors in enterprise logs
14:30
McNicol, Meyers
Beyond Automated Testing
Holcomb
Attacking Patient Health: The Anatomy of Hospital Exploitation
15:30
Hoffman
How to Join the Infosec Community
Ross, Warner
Adversarial Post-Exploitation: Lessons From The Pros
16:30
Braeken
Abusing Windows with PowerShell and Microsoft debuggers in user-land and kernel-land
Ortiz
Act and Think like an Epidemiologist to Combat Digital Diseases
19:30
BSidesDC After Party sponsored by Altus Consulting Corporation
BSidesDC 2016 - Sunday, October 23
09:00
John, Laycock
YAYA (Yet Another YARA Allocution)
Tills
We Should Talk About This: Data Security as an Issue for Communication Research
Palo Alto Networks -- Advanced Endpoint Protection Ultimate Test Drive
Wireless Capture the Flag (WCTF) - Sunday
Lockpick Village / IoT Village - Sunday
10:30
joyal
Cyber Threats and Russian Information and Electronic Warfare
Norcie
A Hacker's Guide to Usability Testing
12:30
Aguero
Tipping the Scales Back In Our Favor
Man
Tales from the Crypt...(analyst)
13:30
Bianco, McCubbin
Practical Cyborgism: Getting Start with Machine Learning for Incident Detection
Johnson
"Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program
14:30
Zalkind
Users and Cloud Collide: Understanding Threat Vectors in the Enterprise Cloud Environment
Klein
A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise
15:30
Thompson
Tales of Fails and Tools for Message Integrity
Gilsinn
What's the Big Deal with Assessing ICS/SCADA?
16:30
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.