ShmooCon XV - 2019 - Friday, January 18
14:00
Opening Remarks, Rumblings, Ruminations, and Rants
15:30
Everette
Incident Response and the Attorney Client Privilege
16:00
Amirrezvani
Ad-Laundering: Bribes & Backdoors
16:30
Greenstadt, Weerasingh
Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications
17:00
Huerta
How the Press Gets Pwned
17:30
Gorka, Miller
Kinder Garten Security: Teaching the Pre-college Crowd
18:00
Blaze
It’s 2019 and Special Agent Johnny Still Can’t Encrypt
19:00
Firetalks Opening
19:10
Renner
Shut up and Listen
19:30
Schwartz
Specialists versus Jack-Of-All-Trades
19:50
Iversen, Wheeler
Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign
20:10
Stroud
Weapons of Text Destruction
20:30
Giglio
Infosec and 9-1-1: When the Location of Your Emergency is in the Building
20:50
[Redacted]
Whats the latest 411 on 419s?
21:10
Firetalks Closing
ShmooCon XV - 2019 - Saturday, January 19
10:00
Zelivansky
Writing a Fuzzer for Any Language with American Fuzzy Lop
Smith
The Beginner’s Guide to the Musical Scales of Cyberwar
Bilzer, Burke, Joyce
High Confidence Malware Attribution using the Rich Header
11:00
Kseib, Thet
CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger
Cox
The APT at Home: The attacker that knows your mother’s maiden name
Bienstock
BECs and Beyond: Investigating and Defending Office 365
12:00
Rittle
Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC
Koran
Firemen vs. Safety Matches: How the current skills pipeline is wrong
O’Neil
Five-sigma Network Events (and how to find them)
14:00
Kaye, Matwyshyn
Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission
Carstens, Mudge, Thompson
Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
Blaze
Electronic Voting in 2018: Bad or Worse?
15:00
Omaha
Trip Wire(less)
Duff
Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
Portera
Analyzing Shodan Images With Optical Character Recognition
15:30
Vachon, Wong
Social Network Analysis: A scary primer
Brister, Kollars
Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
Ridgway
Security Response Survival Skills
16:00
Soda
Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)
Zajac
A Little Birdy Told Me About Your Warrants
Cuevas, Jensen
iPhone Surgery for the Practically Paranoid
16:30
Paquin
Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker
Meriwether, Zaballos
A Tisket, a Tasket, a Dark Web Shopping Basket
evm
A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries
17:00
Olsen
24/7 CTI: Operationalizing Cyber Threat Intelligence
Blaich, Flossman
Behind Enemy Lines: Inside the operations of a nation state’s cyber program
The Shmoo Group
0wn the Con
ShmooCon XV - 2019 - Sunday, January 20
10:00
Patrick
Building and Selling Solo, an Open Source Secure Hardware Token
FORTRAN
Deconstructing DeFeNeStRaTe.C
Darkstar
Looking for Malicious Hardware Implants with Minimal Equipment
11:00
Grayson, Newlin
IPv666: Address of the Beast
Abraham
Reversing SR-IOV For Fun and Profit
Everspaugh
Un-f*$#ing Cloud Storage Encryption
12:00
Seay, Wiksell
Patchwerk: Kernel Patching for Fun and Profit
Gillula
Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet
Koscher
IMSI Catchers Demystified
13:00
LoST, Merrill, Morris, Potter
Closing Plenary: Between Two Moose
14:00
Closing Remarks


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.