07:00 | Registration - Friday |
|
08:00 |
Demick,
Hazelton,
Jones,
Schroeder
|
Binary Reverse Engineering for Beginners |
Randall
|
Bro Crash Course |
|
15:00 | SANS NetWars Tournament |
09:00 |
Norman,
Weiss
|
Welcome |
Hazelton
|
Building Blocks: The Security Analyst's Toolbox |
|
gabler,
Paguaga
|
I got a shell... now where's the Power |
|
Wireless Capture the Flag (WCTF) - Saturday |
||
Lockpick Village / IoT Village - Saturday |
||
09:15 |
Hofmann
|
Keynote |
10:00 | 2nd Annual - CryptKids Con at BSidesDC |
|
10:30 |
Randall
|
CryptKids Keynote |
Allmon
|
WCTF Magic as told by a clumsy Magician |
|
11:30 |
Beard,
Thyagarajan
|
Detecting Malicious websites using Machine Learning |
MacKay
|
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk |
|
13:30 |
Metcalf
|
PowerShell Security: Defending the Enterprise from the Latest Attack Platform |
Balakrishnan
|
Applying data science to identify malicious actors in enterprise logs |
|
14:30 |
McNicol,
Meyers
|
Beyond Automated Testing |
Holcomb
|
Attacking Patient Health: The Anatomy of Hospital Exploitation |
|
15:30 |
Hoffman
|
How to Join the Infosec Community |
Ross,
Warner
|
Adversarial Post-Exploitation: Lessons From The Pros |
|
16:30 |
Braeken
|
Abusing Windows with PowerShell and Microsoft debuggers in user-land and kernel-land |
Ortiz
|
Act and Think like an Epidemiologist to Combat Digital Diseases |
|
19:30 | BSidesDC After Party sponsored by Altus Consulting Corporation |
09:00 |
John,
Laycock
|
YAYA (Yet Another YARA Allocution) |
Tills
|
We Should Talk About This: Data Security as an Issue for Communication Research |
|
Palo Alto Networks -- Advanced Endpoint Protection Ultimate Test Drive |
||
Wireless Capture the Flag (WCTF) - Sunday |
||
Lockpick Village / IoT Village - Sunday |
||
10:30 |
joyal
|
Cyber Threats and Russian Information and Electronic Warfare |
Norcie
|
A Hacker's Guide to Usability Testing |
|
12:30 |
Aguero
|
Tipping the Scales Back In Our Favor |
Man
|
Tales from the Crypt...(analyst) |
|
13:30 |
Bianco,
McCubbin
|
Practical Cyborgism: Getting Start with Machine Learning for Incident Detection |
Johnson
|
"Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program |
|
14:30 |
Zalkind
|
Users and Cloud Collide: Understanding Threat Vectors in the Enterprise Cloud Environment |
Klein
|
A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise |
|
15:30 |
Thompson
|
Tales of Fails and Tools for Message Integrity |
Gilsinn
|
What's the Big Deal with Assessing ICS/SCADA? |
|
16:30 | Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.