Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Introduction to Software Defined Radio with the RTL-SDR on Windows and the Raspberry Pi 2 10:00am - 2:00pm
Intro to Burp Suite 3:00pm - 7:00pm
Working with WAF 10:00am - 7:00pm
The Art of the Jedi Mind Trick: Learning Effective Communication Skills (Jedi Mind Tricks 101) 10:00am - 2:00pm
Spear Phishing – How-to and Prevention 3:00pm - 7:00pm
Introduction to Digital Forensics (Part 1) & Mobile Device Forensics (Part 2) 10:00am - 2:00pm
Getting a Job through Social Engineering 3:00pm - 7:00pm
Opening Ceremony 2:00pm - 2:50pm
Keynote – Dave Lewis 3:00pm - 3:50pm
Food Fight! 4:00pm - 4:50pm
IoT on Easy Mode (Reversing and Exploiting Embedded D... 5:00pm - 5:50pm
Binary defense without privilege 6:00pm - 6:50pm
Intro to Ham Radio 10:00am - 2:00pm
Ham Radio Exams 3:00pm - 7:00pm
Enterprise Identity & Access Management Architecture 10:00am - 7:00pm
Introduction to Wearables 10:00am - 2:00pm
Advanced Wearables with Kaleidoscope Eyes 3:00pm - 7:00pm
Writing your first exploit 10:00am - 2:00pm
Intro to LockPicking A 2:00pm - 4:00pm
Intro to LockPicking B 4:00pm - 6:00pm
Lunch 1:00pm - 2:00pm
Sans NetWars 1:00pm - 6:00pm
Break on Through (to the Other Side) 10:00am - 11:00am
Creating a Successful Collegiate Security Club (WIP) 11:00am - 12:00pm
Now You See Me, Now You Don’t – Leaving your Digital Footprint 12:00pm - 1:00pm
Red Team Madness – Or, How I Learned To Stop Worrying and Expect... 2:00pm - 3:00pm
Medical Devices, the Flat Network of Unknown Risks 3:00pm - 4:00pm
Top 10 Mistakes in Security Operations Centers, Incident Handlin... 4:00pm - 5:00pm
Head in the Sand Defence or A Stuxnet for Mainframes 5:00pm - 6:00pm
Establishing a Quality Vulnerability Management Program without... 10:00am - 11:00am
Bootstrapping A Security Research Project 11:00am - 12:00pm
Planes, Trains and Automobiles: The Internet of Deadly Things 12:00pm - 1:00pm
Open Source Malware Lab 2:00pm - 3:00pm
Title: You want to put what…where? 3:00pm - 4:00pm
Untrusted Onions: Is Tor Broken? 4:00pm - 5:00pm
SIEM, Supersized! 5:00pm - 6:00pm
Why it’s all snake oil – and that may be ok 10:00am - 11:00am
Playing Doctor: Lessons the Blue Team Can Learn from Patient Eng... 11:00am - 12:00pm
Killing you softly 12:00pm - 1:00pm
So you want to be a CISO? 2:00pm - 3:00pm
PPRT – PowerShell Phishing Response Toolkit 3:00pm - 4:00pm
Contextual Threat Intelligence: Building a Data Science Capabili... 4:00pm - 5:00pm
Fantastic OSINT and where to find it 5:00pm - 6:00pm
Getting a Job through Social Engineering 10:00am - 2:00pm
Power of Pi Revised 10:00am - 2:00pm
Making Your Home Router Into Enterprise 10:00am - 2:00pm
How to Build a Home Lab 10:00am - 2:00pm
A Major New Trend in the Enterprise is Whitelisted Proxies 10:00am - 11:00am
Hacking Our Way Into Hacking 11:00am - 12:00pm
Lunch 12:00pm - 1:00pm
Your Password Policy Still Sucks! 1:00pm - 2:00pm
Closing Ceremony 2:00pm - 3:00pm
Haking the Next Generation 10:00am - 11:00am
Attacking OSX for fun and profit: Toolset Limitations, Frustrati... 11:00am - 12:00pm
Where to Start When Your Environment is F*(K3d 10:00am - 11:00am
Intro to Mobile Device Testing 11:00am - 12:00pm