08:45 | Greeting |
|
09:00 | Keynote: Cyber Security in the Age of Espionage |
|
10:00 |
Fitzgerald
|
Honeypots and Live Threat Intelligence |
Boozarjomehri
|
Private matters |
|
Wojno
|
Incident Response - No Pain No Gain |
|
Spaulding,
Spaulding
|
Redefining Security in a Cloud-Centric Future |
|
Hefflin
|
De Falsis Deis: Social Contracts |
|
Jobs
|
Finding Buried Treasure: The Pirate’s Guide to Job Search |
|
Banks,
Bullock
|
Build Your Own Physical Pentesting Go-Bag |
|
11:00 |
Curry
|
Lessons from the Field: Governance, Compliance & Security in SharePoint Online |
Paguaga
|
Pow Pow Pow Powershell! |
|
Pusateri
|
Propel Your Security Career by Writing Your Own Story |
|
Williams
|
Securing The Electrical Grid From Modern Threats |
|
Sattler
|
Build the capability to Detect, Triage And Respond |
|
Jobs
|
Pirate Booty: Navigating the High Seas to Find Your Career Treasure |
|
Hartman
|
NFC Your Smartphone's Best Friend or Worst Nightmare |
|
12:00 |
Adams,
Myers
|
Managing Your MSSP |
Thompson
|
Advanced Targeted Attack. |
|
Zukowski
|
Securing Agile Development |
|
Workentin
|
What the Hell is ICS Security? |
|
Iker
|
e-Extortion Trends and Defense |
|
13:00 |
Brown
|
HIPAA for Infosec Professionals |
Kron
|
Phishing Pholks Phor Phun and Prophit |
|
Hays
|
Weaponizing Splunk: Using Blue Team Tools for Evil |
|
Blankenship
|
Chaining the Future: Blockchains and Security |
|
Protecting Third-Party Risk From Plundering |
||
14:00 |
Seaman
|
ArchStrike Linux |
Domko
|
Alert All the Things! (Network Baselines/Alerts with Bro Scripts) |
|
Hinckley
|
Office 365 Security Center Planning Considerations |
|
Echavarria,
Partlow
|
Interactive Incident Response |
|
Brown,
Mazurov
|
Protecting Visual Assets: Digital Image Counter-Surveillance Strategies |
|
Jobs
|
The Pirate’s Map: How Not to Bury Treasure in Your Resume |
|
Rasmussen,
Soto
|
Deconstructing 100% JavaScript-based Ransomware |
|
15:00 |
Singer
|
Hacking The Sabbath |
Beaudry
|
Intro to Fuzzing for Fun and Profit |
|
Vehent
|
Mozilla's tips on strong HTTPS |
|
Jobs
|
Resume Review |
|
Genoese
|
What I've Learned Writing CTF Challenges |
|
16:00 | Closing |
|
16:15 |
Poulsen
|
How Cybercrime Became Big Business |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.